Cyber monitoring · AI-augmented SIEM

Cyber monitoring and log analysis: see the invisible in your logs.

AI module reading millions of log lines from applications, systems, network and cloud, detecting behavioural anomalies, correlating multi-source alerts, and classifying incidents by severity. Daily summary reports for the CISO, real-time alerts on critical incidents. Coupled with our managed SOC for 24/7 incident handling. Compliant with NIS 2 (ILR 24h notification) and DORA (ICT operational resilience) requirements.

Main features

What the software actually does.

Multi-source ingestion

Log collection from Windows Event Log, Linux syslog, Microsoft 365 audit log, Google Workspace, AWS CloudTrail, Azure Monitor, GCP Audit, firewalls (Fortinet, Palo Alto), EDR (CrowdStrike, SentinelOne, Defender), Kubernetes audit. Native connectors >40 sources. OCSF-normalised format.

Behavioural detection (UEBA)

AI builds a behavioural baseline per user and entity (workstations, servers, apps), then alerts on statistically significant deviations: unusual logins, off-hours access, abnormal download volume, lateral movements. Separates noise from signal.

Multi-source correlation

A real attack leaves traces scattered: Active Directory + EDR + network + cloud. AI correlates these individually-insignificant events to reconstruct the full attack chain (MITRE ATT&CK). 10x reduction in investigation time.

Automatic classification

Each detected incident is automatically classified by severity (critical, high, medium, low), MITRE tactic (initial access, persistence, exfiltration, etc.) and regulatory obligation (CNPD / ILR / CSSF notification required yes/no). Accelerated SOC triage.

Early ransomware detection

Specific signals: mass encryption, shadow copy deletion, Defender disablement, PsExec/WMI deployment. Alert before full encryption. Coupled with an EDR, enables host isolation within 30 seconds.

CISO summary reports

Daily mail to CISO: 3 priority incidents from yesterday, key indicators (MTTD, MTTR, false positives), monthly trends. No more logs to read, just the essentials. Monthly executive report for the board with cyber risk evolution.

NIS 2 / DORA reporting

Auto-generation of ILR alert form within 24h for NIS 2 (Article 23) and CSSF form for DORA. Pre-filled with detected incident details. CISO validates and sends. Dossier retained for later audit.

Threat hunting

Conversational interface: the CISO asks in natural language "have you seen connections from Iran this week" or "show me admin accounts active on weekends", AI translates to a log query and returns structured results.

Use cases

Who it is for, and in what context.

Support PSFs and retail banks: regulatory CSSF + DORA monitoring, CSSF alert on incident.

Hospitals and health/social structures (NIS 2 essential entities healthcare sector): detection of intrusions targeting patient data, ILR alert within 24h.

Municipalities and public administrations (NIS 2 essential entities public sector): ransomware detection, defacement, citizen data leak.

Industrial SMEs and critical B2B suppliers (NIS 2 important entities): cyber monitoring without recruiting an internal SOC.

Law firms, trustees, family offices: protection of sensitive client data, ISO 27001 compliance.

Regulatory compliance

NIS 2, DORA, GDPR, ISO 27001.

  • NIS 2 (Directive 2022/2555 + LU law 5 May 2026) Article 23: ILR incident notification within 24h (initial alert), 72h (intermediate report), 1 month (final report). Our module pre-fills the 3 forms.
  • DORA (Regulation 2022/2554) pillars 2 (ICT incident management), 3 (resilience tests), 4 (ICT third-party risk management). Automated CSSF reporting.
  • GDPR Article 33: CNPD breach notification within 72h. Automatic detection of personal data leaks, pre-filled CNPD form.
  • ISO 27001 Annex A: controls A.5.24 (incident management), A.5.25 (post-incident assessment), A.8.15 (logging) and A.8.16 (monitoring activities) covered by design.
  • Log retention: 12 months hot storage (interactive search), 5 years cold storage (CSSF sectoral obligations), certified deletion at expiry.
  • Luxembourg hosting only, AES-256 encryption, per-institutional-client segmentation, annual ISO 27001 audit.
Architecture · Hosting

Technical stack and data sovereignty.

Ingestion: lightweight agents (Wazuh, Vector, Beats) or native syslog/API. Kafka streaming pipeline + ClickHouse for hot storage, S3 (AES-256 encrypted, OVH or Scaleway EU) for cold. AI models: anomaly detection (Isolation Forest, autoencoders), classification (BERT fine-tuned on real incidents), NLP for threat hunting (Mistral on-premise or GPT-4 per policy).

Visibility: custom Grafana dashboard + conversational web interface. Notifications: email, Slack, Teams, SMS for critical alerts. Coupled with our Luxgap managed SOC 24/7 for handling.

Hosting: Luxembourg (Tier IV LU-CIX) + DRP in Strasbourg (OVH SBG5). RTO 4h, RPO 15 minutes.

FAQ

Frequently asked questions

How much does it cost?
Pricing based on ingested log volume (GB/day) and number of monitored assets. For a 100-staff SME with servers + cloud, expect EUR 1,500 to 3,500/month. For a PSF/bank with DORA requirements, EUR 4,000 to 12,000/month per scope. Quote on scoping.
Do my logs leave the country?
No. Primary hosting Luxembourg (Tier IV datacenter), secondary DRP Strasbourg (OVH SBG5, France). 100% EU. US CLOUD Act does not apply. For defence clients, on-premise hosting possible.
Does the service replace an internal SOC?
Either. For organisations without an internal SOC: yes, it is a complete externally-managed SOC. For organisations with a SOC: it is an AI augmentation layer that reduces noise and accelerates triage. Both models supported.
What is the detection time (MTTD)?
2026 internal median: 7 minutes for critical incidents (ransomware, exfiltration), 38 minutes for medium incidents (compromised account, lateral movement). MTTR (remediation time): 22 minutes median on critical incidents with coupled EDR.
How does NIS 2 compliance work?
The module pre-fills the 3 ILR forms (24h, 72h, 1 month) with detected incident details. Our team supports the CISO in qualifying the incident and submitting to the ILR. Complete dossier retained for 5 years for later audit.

Try this software on your real data.

POC with no long-term commitment. Tailored quote within one business day.

Build my quote →