Red Canary has announced new capabilities for Red Canary Security Data Lake, a service that enables IT and security teams to efficiently store, search, and access large volumes of infrequently accessed logs—such as firewall, DNS, and SASE data—without overspending on legacy SIEMs.
Security teams struggle to balance data retention costs with ensuring they have the relevant logs available when needed for threat investigations and response. In fact, new research surveying 300 IT and security professionals, commissioned by Red Canary and conducted by Censuswide in February 2025, found that:
- Just 35% of data stored in legacy SIEMs delivers tangible value for threat detection.
- Only 13% of organizations separate out low value data for cheaper storage in a raw data repository.
- Due to SIEM storage costs, 68% of IT security decision makers discard low value data and have to hope they won’t regret it.
- 84% of IT security decision makers say having a security data lake to store low value logs at reduced costs would maximize the value of their SIEM spend.
- 62% of IT security decision makers say they are fed up with pouring money down the drain storing useless data just to tick a box for compliance.
Red Canary’s new Security Data Lake capabilities help organizations tackle these issues head on. Whether organizations are looking to complement an existing SIEM investment by storing lower-value data more efficiently or need a standalone solution for managing security logs without a SIEM, Red Canary’s Security Data Lake delivers flexibility, cost savings, and seamless access to critical data when it matters most.
What’s new:
Ingest logs from any source
- Retain high-volume, infrequently accessed logs, such as firewall, DNS, and SASE data.
- Store raw, line-delimited data (e.g., JSON strings, Syslog messages) that is writable to an Amazon S3 bucket or Syslog collector.
Demonstrate compliance in highly regulated industries, such as financial services and healthcare
- Store logs indefinitely to meet retention requirements.
- Export logs on demand to compile audit reports when needed.
Ensure data availability for threat investigations
- Use SQL search to run ad-hoc queries during incident investigations.
- Search data by attributes such as hostnames, IPs, URLs, and date/time ranges.
- Perform basic statistical analysis to enhance detection workflows.
Additional resources:
- Learn more by reading the announcement blog.
- Register now for a webinar showcasing Red Canary Security Data Lake on April 2.
Methodology:
Research based on a survey of 300 IT security decision makers in the U.S. (200) and UK (100) in enterprises with over 1,000 employees. It was commissioned by Red Canary and conducted by Censuswide in February 2025.
Specops Software Boosting Multi-Factor Authentication Layers for Active Directory With Specops Secure Access
Posted in Commentary with tags Specops on March 4, 2025 by itnerdSpecops Software, an Outpost24 company and leading provider of password management and user authentication solutions, today announced the launch of Specops Secure Access, a new capability that provides multi-factor authentication (MFA) to Windows logon, Remote Desktop Protocol (RDP), and VPN connections. This new innovation adds a vital layer of security to on-premises or hybrid Active Directory environments, strengthening protection against unauthorized access and credential-based attacks.
Password-based threats are on the rise. Specops Software’s 2025 Breached Password Report uncovered over a billion passwords stolen by malware over a 12-month period, while data by Microsoft revealed that 7,000 password attacks were blocked every second as it tracked more than 600 million identity-based attacks against organizations in 2024. Worryingly, 99.9% of breached accounts lacked multi-factor authentication, highlighting the current landscape of password security necessitates improved defenses against password-related threats and MFA.
Specops Secure Access tackles this issue by integrating MFA into the logon process, enabling organizations to safeguard both user passwords and authentication workflows, reinforcing overall cybersecurity without compromising ease of use. Specops Secure Access provides user-friendly MFA at key points where Active Directory passwords are used. With flexible options, it ensures secure authentication for logon, RDP, and VPN, whether users are online or offline.
Organizations that deploy Speops Secure Access will also meet compliance for a variety of industry standards including:
By using Specops Password Policy, continuous scanning against an up-to-date compromised password database enables organizations to block the use of weak passwords and check Active Directory passwords against a growing database of over 4 billion unique compromised passwords.
Specops Secure Access is available now to all Specops Breached Password Protection customers.
To learn more about Specops Secure Access, click here.
Leave a comment »