I have a few questions….
Is there any integration with other SIEMs – like QRadar?
Do you have a restful API to connect to if I need to create an integration?
How can logs be ingested into a SIEM
Discover why seeing is securing with revolutionary PKI monitoring and alerting.
Learn More About PKI Spotlight®PKI Solutions has announced the latest release of PKI Spotlight®, a Public Key Infrastructure monitoring and alerting solution designed to address specific, ongoing tasks that CISOs are responsible for in the current cybersecurity landscape. With the upcoming cybersecurity bill from the SEC and other regulatory bodies and increasingly complex IT requirements, CISOs are facing new emerging threats to PKI environments, cybercrime insurance requirements, and a shrinking talent pool. PKI Spotlight aims to help CISOs secure the enterprise and customer data against exploitable PKI misconfigurations and vulnerabilities, extend visibility into non-Microsoft PKIs, and scale PKI expertise.
This release of PKI Spotlight® introduces the following capabilities:
This release of PKI Spotlight®, a Public Key Infrastructure monitoring and alerting solution, is designed to address the specific jobs to be done of CISOs in the current cybersecurity landscape. With the upcoming cybersecurity bill from the SEC and other regulations and concerns, CISOs are facing new emerging threats to PKI environments, cybercrime insurance requirements, and a shrinking talent pool. PKI Spotlight® aims to help CISOs secure the enterprise and customer data against exploitable PKI misconfigurations and vulnerabilities, extend visibility into non-Microsoft PKIs, and scale PKI expertise while saving at least $185k in salary per year.
Nick Sirikulbut, Director of Business Development, and Michael Bruno, PKI Software Engineer, showcased the latest features of PKI Spotlight® with a heavy focus on getting, and keeping you compliant and prepared with visibility into your PKI environment.
We also demonstrated how PKI Spotlight® will automatically alert you on the presence or absence of SpecterOps’ ESC1 to ESC8, which can be exploited to cause common audit failures.
And we provided a glimpse into out new SIEM support with SPLUNK and will reiterate some features you may have missed, such as HashiCorp and our extended visibility into your PKI environment.
Industry Experts Agree
“With PKI Solutions, we get the best-in-class PKI expertise. PKI Spotlight® is an important addition to our portfolio of products and gives us productivity gains together with peace of mind that our PKI systems are available and functional, and any service that relies on our PKI is operating smoothly and securely,” said Scott Fales, principal network engineer at BayPort Credit Union. “We expect our reliance on our PKI environment to increase over time and having a product like PKI Spotlight® means that we can reliably execute on initiatives that continue to improve our security posture.”
According to Roger A. Grimes, 34-year cybersecurity consultant and author of 13 books and more than 1,200 magazine articles on computer security, the time has come for a product like PKI Spotlight®. “Whether you have one PKI server or dozens, you should get PKI Spotlight®. It’s what Microsoft should have created 20 years ago,” said Grimes. “Once you see what it does it seems so obvious why you absolutely need it.”
Making CISOs Look Good and Pass Audits
Q: Do you also monitor for “high value accounts in UPNs” (i.e. Enterprise Admins, Domain Admins, etc.) or Computer-Accounts (DCs)?
A: Yes, and low value too. If Domain Users have write or full control on a template – that is a risk as well.
Q: If your certificate template only allows a specific service account (used by Venafi for example) to enroll using that template, do the other issues matter then?
A: Yes, as any service account or context is generally only protected through password NTLM, which then translates into Kerberos and then enrolls. The service account often has pretty high credentials that are targets for attacking. There are risks associated with many types of templates and if not properly managed, could introduce new risks
Q: I saw you have added some SIEM support to this version – but it was for Splunk. Are you planning to add support to Microsoft Sentinel and LogRhythm SIEM?
A: Yes, We will continue to evaluate different SIEM solutions. Microsoft Sentinel is on the list. Feel free to reach out if you would like to see MS Sentinel and LogRhythm support in PKI Spotlight. Importantly we will work with any customer who buys Spotlight to make sure their SIEM is supported.
Q: Are tcp/80 (HTTP) based – Internet facing CRLs vulnerable to underlying OS level attacks?
A: Not directly, the CRL is cryptographically signed and any tampering will be detected. However, a DoS attack could make the CRL inaccessible and cause disruptions in an environment. But it is not common. nor needed, to use TLS protection for access to CRLs
President & Founder at PKI Solutions, Leading PKI Cybersecurity Subject Matter Expert, Author, Speaker, Trainer, Microsoft Certified Master.
View All Posts by Mark B. CooperI have a few questions….
Is there any integration with other SIEMs – like QRadar?
Do you have a restful API to connect to if I need to create an integration?
How can logs be ingested into a SIEM
Is there any integration with other SIEMs – like QRadar?
Splunk is the only native integration that we currently offer.
Do you have a restful API to connect to if I need to create an integration?
We leverage a REST API to send data to Splunk, but that data mapping may not be compatible with other SIEMs. Fortunately, we do have integration into different SIEMs, including QRadar, on our short-term roadmap. We are evaluating the best path forward for new SIEM integrations, comparing native integrations vs. exposed REST endpoints.
Please reach out, +1 (971) 231-5523, if QRadar integration is part of your evaluation criteria for PKI Spotlight®. We will be happy to discuss how soon we would be able to support QRadar.
How can logs be ingested into a SIEM?
PKI Spotlight® generates event logs that are easily accessible and used to send event data into tools like QRadar. The only caveat is that you would need to map the data within QRadar.