
Security Informations and Events Management (SIEM) e XDR
Zerum Oktos™ is a security information and event manager, a centralized solution
for aggregating and analyzing telemetry in real time, detecting threats, monitoring logs and alerting your organization’s SOC team.

Why Zerum Oktos?
integrated security
Integrated SIEM, XDR and Container Security Capabilities
Oktos combines traditional SIEM functionalities with extended XDR capabilities, enabling correlation and integrated detection between multiple attack vectors – endpoints, networks, servers, containers and cloud – for a more effective and comprehensive response.

complete visibility
Monitor every point on the network.
With SIEM, endpoint monitoring and Zerum Lynx NDR, you guarantee full coverage. SCA functionality detects faults and misconfigurations so you can act before they become a problem.

simplified compliance
Always comply.
Get the visibility you need to meet internal requirements and regulations. With SCA’s support, identify risks and facilitate audits more efficiently.

Extended visibility
In addition to collecting and aggregating security-related data, Zerum Oktos also monitors your endpoints (computers, servers, etc.) using agents from Zerum’s XDR module.

24×7 monitoring with complete visibility
Endpoints, networks, servers, containers and cloud workloads.
Embedded threat intelligence
updated base with indicators of compromise (IOCs) and attack techniques (TTPs).


security configuration assessment (SCA)
Take advantage of the SCA feature to identify misconfigurations and security flaws or deviations from
best practices and security standards in your infrastructure.
security log analysis
Collection and aggregation of logs from various systems and sources. Real-time analysis of logs to identify
patterns, anomalies and possible security threats. Generation of alerts and reports to enable
investigation or information for senior management.

More
benefits
Advanced Malware Detection
Combining file integrity monitoring, up-to-date signatures and threat intelligence, the solution detects sophisticated malware and other emerging threats.

Intelligent Automation and Rapid Response
Automated playbooks enable immediate responses, such as lockdowns and isolation, reducing impacts and optimizing the use of security resources.

Compliance and Governance Made Easy
Zerum Oktos helps with compliance with regulations such as LGPD, ISO 27001, GDPR, PCI-DSS, among others, generating evidence and reports for auditing and analysis.

Questions and answers
Oktos combines SIEM, XDR and container security functionalities in a single platform, offering comprehensive protection across multiple attack vectors. In addition, it offers continuous vulnerability assessment and compliance, intelligent automation for rapid responses, and dedicated support for modern environments such as the cloud and containers.
Zerum Oktos helps organizations comply with regulations such as LGPD, ISO 27001, GDPR and PCI-DSS, generating evidence, audit reports and analyses that facilitate governance and demonstrate adherence to security policies.
Zerum Oktos can work with or without agents, depending on the level of depth desired in data collection. For more complex environments (such as servers, containers and cloud workloads), the use of specific sensors or connectors may be necessary to obtain greater visibility and carry out continuous security assessments.
Zerum Oktos already comes with a robust base of ready-to-use content: correlation rules, dashboards, response playbooks, vulnerability profiles and mapping with frameworks such as MITRE ATT&CK. This significantly speeds up deployment time and value delivery, reducing the need for extensive customizations from the outset – although it allows for in-depth customizations as the team matures.
Oktos has native connectors and support for widely used protocols (such as Syslog, REST, STIX/TAXII and others), facilitating data ingestion and interoperability with tools such as EDRs, antivirus, firewalls, Active Directory, NDRs, cloud solutions and SOAR platforms. It has been designed to fit into heterogeneous environments, respecting the investment already made by the customer.
Do you want expert support
to identify and eliminate cyber threats?
We’re here
to help you.