Ghost Artemis
  • Main down-arrow
    • Home
      Return home
    • About
      What we do
    • Contact
      Reach out to us
    Home
    Return home
    About
    What we do
    Contact
    Reach out to us
  • Resources down-arrow
    • Starting Point
      Quick start guide
    • Tutorials
      All the grokking you can do
    • FAQ
      Common questions
    Starting Point
    Quick start guide
    Tutorials
    All the grokking you can do
    FAQ
    Common questions
  • Projects down-arrow
    • Hunter
      On issues of SIEM..
    • Spotlight
      Contest winners...
    Hunter
    On issues of SIEM..
    Spotlight
    Contest winners...
  • Legal down-arrow
    • Terms of Use
      Also terms of service
    • Privacy Policy
      We take privacy seriously
    • Rules
      You know the rules and so do we
    • Copyright
      © 2019-2022
    Terms of Use
    Also terms of service
    Privacy Policy
    We take privacy seriously
    Rules
    You know the rules and so do we
    Copyright
    © 2019-2022

Hunter

An open source project to build a SIEM

What is a SIEM?

A Security Information and Event Management (SIEM) solutions enable an organisation to have a view of their network and collect data across their network. This helps them to provide real time analysis of any activity that might lead to a potential risk to the organisation. SIEM technology has been in existence for more than a decade, initially evolving from the log management discipline. It combined security event management (SEM) – which analyzes log and event data in real time to provide threat monitoring, event correlation and incident response – with security information management (SIM) which collects, analyzes and reports on log data.

What is Hunter?

Hunter is a Security Information and and Event Management (SIEM) tool which helps network administrators to detect, respond and report to threats on networks and deliver a comprehensive security analysis. You get an integrated platform for your security operations center (SOC) which better aligns your technology and team. Hunter will help your team be ready for all the threats coming your way.


Basic Features

  • Log aggregation
  • Real time data
  • Incident investigation
  • User management
  • Automation of incident responses