Categories

guides

Discover non-standard hosts using checkif directive

DNIF integration with Freshdesk allows DNIF users to create incidents/tickets directly in Freshdesk. This empowers security analysts to collaborate with teams that use Freshdesk within the organization. Click here to learn more.

3 Questions to Ask Your UEBA Provider

Many organizations have started to realize the need for User Entity and Behavior Analytics (UEBA) solutions. In this blog we discuss some crucial points that you need to keep in mind when evaluating a UEBA solution for your organization. Learn more.

Validating Suspicious Domains Using DomainTools

Use DNIF - DomainTools Threat Intelligence API to protect your's as well as your clients business form cyber threats. To know more about the threat hunting use cases you can create, read our blog.

6 Easy Ways To Stay Safe Online

At DNIF we’ve been helping large enterprises and small companies tackle cybersecurity threats and keep their data safe. Click here to see 6 easy ways you can stay safe online.

Detect Cross Site Scripting in DNIF

Know how DNIF detects Cross Site Scripting. Click here to have a glimpse on how we use the Search interface of the DNIF web console to find the relevant attack vectors.

Analytics with AWS VPC Flow Logs

DNIF can now ingest VPC Flow Logs, that enables you to capture information on the IP traffic moving to and from network interfaces in your VPC.

Data Analytics with AWS S3 Logs

Know how DNIF helps organisations use AWS S3 that is a simple web services interface that you can use to store and retrieve any amount of data, at any time, from anywhere on the web.

How To Integrate OSQuery And DNIF

OSQuery is an OS instrumental framework that can work with Linux, Windows, OS X(macOS) and FreeBSD platforms to perform a low-level monitoring and analytics on both performant and intuitive.


events

Join us at an event near you

Come meet us at VJTI - Startup Netcon 2019, SACON 2019, Nullcon Conference, RSA Conference. Read on to find out where we’ll be next and join us at an event near you.

Nullcon Goa 2018

Team DNIF have been an active part of Nullcon Conference & will be taking part this year as well. Click here to check out the exhibition layout & to find us in action.

RSA San Francisco 2018

DNIF is excited to announce participation at the RSA Conference, San Francisco. Click here to know more about DNIF that enables businesses to detect and address security challenges

SACON 2017

DNIF is excited to announce participation at SACON, Bangalore from 10 to 11 November 2017. Click here to know more about DNIF that enables businesses to detect and address security challenges

NASSCOM Product Conclave 2017

It is exciting to participate at the NPC 2017. Would be awesome to meet you at the workshop on 'The Name’s Bot, James Bot'

c0c0n 2017

c0c0n, previously known as Cyber Safe, is an annual event conducted as part of the International Information Security Day.

RSA Singapore 2017

DNIF being showcased at RSA Singapore 2017, hop over to booth 69 and hang out with friends from the data analytics industry - it's going to be a fun place to be.

DSCI Best Practices Meet 2017

Workshop on Data Science by Shomiron DAS GUPTA at the Data Security Council of India (DSCI) Best Practices Meet 2017. Key points discussed and ideas shared at the workshop.


release-notes

Release Note — v8.4.1

In this blog, we reveal some exciting features and enhancements that will greatly improve your productivity when it comes to managing your DNIF deployment and IT infra. Click here to know more.

Release Note — v8.1.1

In this blog, we reveal some exciting features and enhancements for DNIF that will greatly improve your productivity when it comes to managing your DNIF deployment and IT infra. Click here to know more.

Release Note — v7.12.2

In this blog, we reveal software release notes for DNIF version v7.12.0 that delivers a new set of features and enhancements within the web console. Click here to know more.

Release Note — v7.9.0

In this blog, we reveal software release notes for DNIF version v7.9.0 that delivers a new set of features and enhancements within the web console. Click here to know more.

Release Note — v7.8.0

In this blog, we reveal software release notes for DNIF version v7.8.0 that fixes bugs & delivers a new set of features within the web console. Click here to know more.

Release Note — v7.3.0

In this blog, we reveal software release notes for DNIF version v7.3.0 that fixes bugs & delivers a new set of features within the web console. Click here to know more.

Release Note — v7.2.0

In this blog, we reveal software release notes for DNIF version v7.2.0 that fixes bugs & delivers a new set of features within the web console. Click here to know more.

Release Note — v6.12.0

In this blog, we reveal software release notes for DNIF version v6.12.0 that fixes bugs & delivers a new set of features within the web console. Click here to know more.

Release Note — v6.9.0

Software release note for DNIF version 6.9.0 — . This release fixes bugs and delivers several enhancements.

Release Note — v6.8.0

Software release note for DNIF version 6.8.0 — 07.08.2017. This release Fixes bugs and delivers several enhancements.

Release Note — v6.7.0

Software release note for DNIF version 6.7.0 — 07.01.2017. This release Fixes bugs and delivers several enhancements.


case-studies

Securing Telecom

This case study helps us understand various challenges faced by the organisations within the Telecom sector and how DNIF helps solve their cyber security challenges them.

Securing BFS

This case study helps us understand various challenges faced by the organizations within the banking and finance sector and how DNIF addresses them.


soar

DNIF & Freshdesk Integration

DNIF integration with Freshdesk allows DNIF users to create incidents/tickets directly in Freshdesk. This empowers security analysts to collaborate with teams that use Freshdesk within the organization. Click here to learn more.

Threat intelligence and SOAR for SOC managers

As an SOC manager, you’re responsible for keeping your security operations center in tip-top shape — and in modern IT environments. Security orchestration, automation, and response (SOAR) may be just what you need. Read more.

What is SOAR and how it transforms security operations

In this blog, you’ll learn more about SOAR and the ways Security Automation and Orchestration tools transform security operations. Click here to know how SOAR can help your organizations automatically respond to security alerts.

Optimize IT Security Budget with SOAR

Learn what is SOAR and how it can redefine your spends on IT Security. Read how to optimize your spends on people, processes and technology for your security operations.

Alert Investigation Made Easy With SOAR

In this article, DNIF team has jotted down points on why SOAR is the best guide for analysts stuck in the maze of alerts. Click here to find out the benefits of SOAR & strategies that businesses adapt for optimal threat hunting.


siem

What You Need to Know About Threat Detection and Response

Traditional approaches to threat detection and response is not enough in today's sophisticated cyber landscape. In this blog we share with you some crucial insights on how you can improve your security posture in face of modern cyber threats.

Improving threat detection and response with SIEM Integration

Despite the expensive cyber security solutions that organizations have in place, they often fail to identify and detect threats when it matters most. In this blog we discover some key strategies to improve the overall security posture with a SIEM solution.

Combat Cyberthreats With Next Gen SIEM

As the cyberthreat landscape continues to evolve in sophistication, traditional SIEMs have failed to keep up with them. In this blog we share some crucial insights as to how you can use next gen SIEMs to combat next gen threats. Click here to learn more.

Validating Suspicious Domains Using DomainTools

Use DNIF - DomainTools Threat Intelligence API to protect your's as well as your clients business form cyber threats. To know more about the threat hunting use cases you can create, read our blog.

How much does SIEM cost

When it comes to selecting a SIEM platform, pricing can be a deciding factor and in this blog we touch few important points to consider when it comes to a vendor's pricing schemes.

Getting started with threat hunting

Threat hunting is a popular buzzword these days in cybersecurity, but how do you actually get started with threat hunting? In this blog we talk to you about just that.

What is the AWS Shared Responsibility Model?

While there is nothing inherently insecure about the cloud, the fact remains that responsibility is shared between service providers and their customers. To know more what's the best approach for your cloud security, click here to know more.

What is outlier detection and why you need it

Outlier detection is the process of detecting and subsequently excluding outliers from a given set of data. In this blog, you will discover more about outlier detection, why do you need it and how do you detect the presence of outliers.


security-analytics

Getting started with threat hunting

Threat hunting is a popular buzzword these days in cybersecurity, but how do you actually get started with threat hunting? In this blog we talk to you about just that.

What is the AWS Shared Responsibility Model?

While there is nothing inherently insecure about the cloud, the fact remains that responsibility is shared between service providers and their customers. To know more what's the best approach for your cloud security, click here to know more.

What is outlier detection and why you need it

Outlier detection is the process of detecting and subsequently excluding outliers from a given set of data. In this blog, you will discover more about outlier detection, why do you need it and how do you detect the presence of outliers.


threat-intelligence

CVE-based Analysis Using vFeed

Vulnerabilities are programming errors that attackers use to gain access to a network or system and perform unauthorized activities. This blog will demonstrate how to use these CVE entries to analyze the vulnerabilities in your system.

Tips for Getting Started With Security Automation

Getting started with security automation might seem a little daunting at first. In this blog, we share with you some important tips and tricks to help you get started with your own security automation process. Click here to know more.

How Threat Intelligence Works

External threat intelligence helps a great deal in detecting known threats out their in the wild. In this 101 blog, discover the what, why and how about threat intelligence and how you can leverage it. Click here to know more.

vFeed Professional and DNIF Integration

DNIF offers a new approach to data enrichment and threat validation by making it easy for its users to harness the power of threat intelligence service like vFeed. In this blog we discuss takes us through the steps in using the vFeed Professional CVE Database with DNIF.

What is Threat Intelligence? Importance of Integrated Security Solution

Threat intelligence is the analysis of threats based on Indicators of Compromise (IOC) gathered from various threat feeds, about existing and emerging threat actors and threats. Threat intelligence platforms collate this data to help businesses stay ahead of emerging and advanced threats.

Detecting malicious URLs with DNIF and VirusTotal

DNIF offers a new approach to data enrichment and threat validation by making it easy for its users to harness the power of threat intelligence service like VirusTotal. Click here to know the capabilities and benefits of integration plugin built by the DNIF Team in collaboration with VirusTotal.

VirusTotal Integration with DNIF

VirusTotal is a free online service that analyzes suspicious files and URLs to facilitate faster detection of viruses. Here we explain, how to integrating VirusTotal API with DNIF for detection of viruses, worms, & other kinds of malicious content using antivirus engines and website scanners


log-management

SIEM is not a buy and forget tool

SIEM is not a buy and forget security tool. Learn about the challenges you might have to overcome while implementing a SIEM solution for your business.


data-lake-solutions

What is Data Lake?

In this article, we discuss in detail about the concept of Data Lake & how it allows you to store all your structured, semi structured & unstructured data at any scale. Click here to know how DNIF implements Data Lakes.


ueba

UEBA in action

UEBA solutions model behavior in order to create a baseline, which is then used to assess potential risks. This blog will showcase DNIF’s UEBA in action.

3 Questions to Ask Your UEBA Provider

Many organizations have started to realize the need for User Entity and Behavior Analytics (UEBA) solutions. In this blog we discuss some crucial points that you need to keep in mind when evaluating a UEBA solution for your organization. Learn more.

Why is UEBA important

Many organizations are turning to User and Entity Behavior Analytics (UEBA) tools to guard against insider threats. In this blog you'll learn more about UEBA as such and why UEBA is a very important component of IT security.

What is UEBA

UEBA is a process of analyzing the behaviors of an organization's insiders, outsiders, entities and applications.Click here to know more about UEBA, how does it work & its advantages


ai-ml-cyber-security