Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

LimaCharlie

Why Does LimaCharlie Exist?

Security is an active market with new vendors emerging regularly. Here is a ”simple” example of what has become a common way to group companies in a logical way - a so-called cybersecurity technology map: This is a lot to take in, yet the above chart is one of the simplest illustrations available when searching “cybersecurity technology map”. A reasonable question could be - how did we get here?

Configuring an Output with LimaCharlie

In this video we demonstrate how to configure an Output in LimaCharlie to send your telemetry anywhere. LimaCharlie users can relay their data anywhere they want for longer term storage and analysis. Where that data is sent depends on which Outputs are activated. You can have as many Output modules active as you want. For example you can send varying levels of data to multiple syslog destinations using the Syslog Output module and then send additional data to some cold storage over an Scp Output module.

Installing the LimaCharlie Sensor

In this short video we show you how easy it is to install the LimaCharlie EDR sensor and get telemetry flowing into the cloud. Once installed you can go live on the sensor and perform digital forensics in real-time. Visually navigate through historic telemetry, view memory maps, kill or suspend processes, explore the file system, view network connections and much more. Watch this video to see how powerful it is.

Handling an incident in LimaCharlie: best practices, capabilities, tips & tricks

LimaCharlie benefits security organizations by providing the core technologies required for cybersecurity operations such as EDR, log ingestion, software defined networking and more. It does this with a self-serve, usage-based model. Run your operations through the web application or leverage the API and infrastructure-first approach to integrate at scale. Join us for this webinar to learn the best practices, tips and tricks for handling an incident.

LimaCharlie Achieves SOC 2 Certification

LimaCharlie has successfully completed its Service Organization and Control (SOC 2) audit. The audit was conducted by the Johanson Group, a leading professional service firm that focuses on SOC 2 & 3 examinations for public and private companies. The Johanson Group counts Cisco, Symantec and Broadcom among their many clients. They have members on the team that are Certified Information System Auditors (CISA) and are Certified Information Systems Security Personnel (CISSP).

Customer Interview: Stefan Waldvogel

LimaCharlie is lucky to have some really amazing people on the platform. During the course of operating our business we often get to interact with our customers and sometimes those customers become friends: Stefan Waldvogel is one of these people. Stefan has had a very interesting journey on his way to becoming a cybersecurity professional and we asked him to share his story.

Automating MITRE ATT&CK Testing w/ Atomic Red Team & LimaCharlie

This LimaCharlie integration of Red Canary's Atomic Red Team enables users to run tests mapped to the MITRE ATT&CK® framework against their deployments with just a few clicks of a button. Security teams can use Atomic Red Team to quickly, portably, and reproducibly test their environments. General Links Course Playlists Social Media.

September Developer Roll Up

The team at LimaCharlie has been moving some big pieces around the board during the month of September. We have been working on something special. On October 12th we will be running a webinar to demonstrate LimaCharlie’s integration of Red Canary’s Atomic Red Team. Atomic Red Team is a library of tests mapped to the MITRE ATT&CK framework. Security teams can use Atomic Red Team to quickly, portably, and reproducibly test their environments….

Get to Market Quicker with LimaCharlie

LimaCharlie offers cybersecurity tools and supporting infrastructure billed based solely on usage in a scalable way. It is an approach that nobody else is taking. One that enables some pretty exciting possibilities for those looking to develop cybersecurity products or services. Open and fine-grained controls allow developers to create products with healthy margins and save years of development time. There is no other way to get to market quicker.