Learn about the new product innovations we deliver every quarter. Read the release notes,
download helpful resources, and register for our release webinars!
We've redesigned how Log360 detects threats. A new centralized detection console now brings together correlation logic, threat intelligence, MITRE ATT&CK mapping, UEBA insights, and a rule builder that supports standard, anomaly-based, and advanced detection logic. Detection insights helps optimize rules with real-world noise levels and usage metrics—enabling focused, high-fidelity alerts.
Fine-tune alert scope using filters based on users, groups, and OUs. These filters apply across predefined rules for use cases like privilege escalations, suspicious password resets, and admin group changes—helping reduce noise from irrelevant accounts like test users or developer machines. It's precise detection, not suppression.
Log360 now supports horizontal scalability with clustered log processors and role-based specialization for alerting, correlation, and search. You can also collect logs from distributed sites and process them centrally — ensuring high performance even in large, hybrid environments.
Get continuously updated detection content mapped to MITRE ATT&CK, without manual imports. Delivered securely from the cloud, this content is curated for emerging threats and multivector attacks, ensuring your detection logic stays current.
Log360 Cloud now features Zia Insights, a contextual AI engine powered by Azure OpenAI (BYOK). Analysts can now:
This release transforms threat investigation workflows— delivering clarity, acceleration, and actionable insights within your SIEM interface.
Log360 Cloud now includes user and entity behavior analytics (UEBA), powered by ML. This capability enables detection of anomalous behavior patterns across your environment:
UEBA equips your SOC to proactively detect insider threats, compromised accounts, and lateral movement.