BlackStratus’ LOG Storm SIEM (Security Information and Event Management) appliances offer a low cost, easy-to-use solution for managing the deluge of security and compliance-related data that inundates your organization every day. LOG Storm combines log management, real-time event correlation and alerting, remediation, and reporting in a single high performance solution that simplifies the time-consuming task of monitoring and managing the compliance and security risks that can affect your business operations.


- Powerful yet affordable log management and security compliance for all environments
- Lightning fast setup and configuration, very easy to manage and use
- Automatic correlation and identification of security incidents
- Rapid access to centralized log data for incident response, forensics, and discovery
- Service-oriented architecture and expandable sizing provides maximum scalability and flexibility
- Built in support for over 1,000 devices and applications plus easy device integration tool
- Includes reporting packs for all major regulatory compliance standards

LOGStorm Image1

LOG Storm provides a complete view of enterprise security posture and rapidly identifies suspicious patterns of activity that would otherwise go unnoticed. Multiple views of actionable security information are tightly integrated with reporting and analytics and intuitively pinpoint true threats.

LOG Storm appliances are also the easiest to deploy and operate. LOG Storm can be deployed in as little as one hour and all systems operation and management is made simple through an array of features and an intuitive graphical user interface.


Compliance regulations require perimeter defenses, asset control, event logging, and data security – and so do common security standards. In short, compliance is security and security is compliance. That’s why LOG Storm delivers a holistic approach to compliance with real-time collection and alerting of security related network data, as well as a full range of compliance monitoring and reporting features right out of the box. Whether it’s PCI, SOX, HIPAA, GLBA, FISMA, ISO 27001 or any of hundreds of other global regulations, LOG Storm places the information you need right at your fingertips.

LOG Storm Delivers a Powerful Suite of Capabilities for Log Management and Security Compliance

 Event Logging and Storage: LOG Storm enables rapid incident investigation and convenient access to all audit and incident data by storing raw logs and correlated events on the same device. The storage capacity for raw logs and correlated events is completely configurable, and, depending on the model, between 9TB - 269TB of compressed raw logs can be stored, enabling long-term, fully accessible, data retention.

 MetaRules™ Correlation: LOG Storm intelligently analyzes all event messages to identify patterns of attack, filters out false positives and prioritizes critical events. All data related to incidents are tagged in ‘threads’ so users can easily identify any effected assets and systems. Incident names such as “Credit Card in the Clear,” “Policy Violation,” and “Malware,” make it easy for even non-technical team members to understand the nature of a threat.

 Rapid Drill-downs and Incident Summaries: Incident information is accessible from nearly all screens within the LOG Storm GUI, and details on incidents are immediately available with an absolute minimum of clicks. Users can quickly investigate all incident-related information and see who was involved in an incident, what systems were affected and how the attack occurred.

 Real-time Incident Identification: LOG Storm’s blazing fast engine normalizes parses and correlates incoming messages in near real-time. Administrators can see threats and attacks the second they are reported, have time to secure systems and prevent the attack from negatively impacting the network and connected assets.

 Vulnerability Scan Integration: By incorporating vulnerability data into its correlation technology, LOG Storm can alert administrators to the true threats, the incidents that have the potential to exploit your systems.

 Zero-day Attack Identification: Using powerful behaviorbased analysis, LOG Storm identifies new attacks that follow similar patterns to past attacks, but use different types of connections to bypass signature-based countermeasures.

 Built-in Incident Remediation: Comprehensive workflow management provides best-practice recommendations for remediation, mitigation, centralized case tracking, and automated notification, so incident response personnel know what to do and administrators have clear insight into the actions of their team.

 Security and Compliance Reporting: LOG Storm delivers detailed reports to aid in investigating incidents, comparing new threats against historical data, and preparing for compliance and corporate audits. Users can gain a better understanding of how an incident occurred, if there has been previous related activity, and what systems might have been affected. LOG Storm’s reporting system enables fast, easy searches of raw logs based on a wide-range of criteria. Preconfigured reports specific to a variety of compliance regulations include PCI, SOX, HIPAA, GLBA, FISMA and ISO.

 Extensive Device Support: LOG Storm includes out-of-the box integration support for over 1,000 devices, systems and applications. An integrated device builder tool lets you quickly and easily add support for other data sources.