| Customers: Innopolis University Innopolis; Education and Science Contractors: SearchInform Product: SearchInform SIEMProject date: 2024/11 - 2025/05
|
2025: Implementation of SIEM system "SearchInform"
Innopolis University has implemented the SIEM system "SearchInform" to identify information security incidents and increase the level of information security in the organization. The system was piloted at the end of 2024 and after successful testing, SearchInform SIEM entrusted the protection of its IT infrastructure. This was announced by SearchInform on June 30, 2025.
According to the customer, the arguments in favor of buying a solution from SearchInform were: pre-installed security policies, quick implementation without long pre-configuration, low software and hardware requirements.
| Ever-growing cyber threats are forcing a continuous increase in the level of protection. The SIEM system is a component of an integrated approach for cybersecurity. The program provides the collection and analysis of information from various sources and further identification of deviations from the specified standards. In SearchInform SIEM, we liked that the system is easy to deploy and configure. The solution identifies threats immediately after installation, which allows you to quickly fight incidents, - said Mikhail Seregin, head of the Information Security Center of Innopolis University. |
The customer noted the convenience of the Task Management tool: it automatically notifies responsible persons about violations and provides the information necessary for the investigation. The "logic" of the incident can be converted into a cross-correlation rule, and the results of each investigation can be uploaded to the report.
| When developing SIEM, we studied the experience of thousands of customers. We focused on companies where there is no large information security department, and IT specialists or system administrators help with security issues, "said Pavel Pugach, a system analyst at SearchInform. - So we offered customers a solution that works out of the box. Such SIEM minimizes the manual work of an information security specialist. We took over the maximum pre-setup and reduced the computational load. This can be seen at every stage of the system: collecting events from sources in the IT infrastructure, correlating and aggregating data, identifying an incident. |
