Resources for Microsoft Partners

Secure new revenue from Microsoft Sentinel customers with LogLocker

Add a new solution to your service offering, one that solves the challenge of retaining the high-value logs needed for compliance​, simply and cost-effectively.

Untitled design (10)

Engage customers with these resources

2-3
Customer benefits

LogLocker solves compliance challenges by providing a robust log management platform for the data and AI economy

LogLocker’s integration with Microsoft Sentinel, Log Analytics and Azure Data Explorer (ADX) enables logs to be filtered, captured, retained and protected in LogLocker’s secure tamper-proof ledger for long-term immutable preservation.​
 
Customer benefits include:
 
  • Reduced costs. Compliance teams can retain log data for the long term at a fraction of the cost of traditional archive solutions​.
  • Minimised data​. Only archive and retain the specific logs needed for business requirements and compliance.​
  • Preserved logs. Retain and protect logs using blockchain technology for truly defensible legal evidence.​
 
39

Reduce cost

Are your clients shocked at the limited options and long-term cost of retaining logs? Help them deploy a cost-effective alternative to Log Analytics and Azure Data Explorer archiving.

35

Minimise data

Compliance teams are looking for ways to avoid storing all logs. With LogLocker, they only archive and retain the specific logs they need for business requirements and compliance.

14-1

Preserve logs

Are your clients worried their logs are not given enough protection? They can now reserve and protect logs using LogLocker's distributed ledger technology for truly defensible legal evidence.

33

Ready for integration

LogLocker API's were designed for easy and effective integrations with Microsoft Sentinel, Log Analytics, Azure Data Explorer and other Microsoft services.

32

No retraining

LogLocker uses Kusto Query Language (KQL) to define the targeted log collections via Azure Sentinel allowing it to align to existing staff roles and skills.

15-1

Extensible data sources

Need to bring in other data sources? No problem. LogLocker will work with any volume or type of data, log or query.

Getting started with LogLocker

Where is LogLocker installed?

azure icon logo

Installed on Azure

LogLocker is deployed into any Azure subscription so your client can govern the security and location of data using the configuration option provided. Includes Terraform, Kubernetes, Storage and Logic App.

Azur regions

In any Azure region

LogLocker can be deployed into any Azure region ensuring clients' data is stored on the blockchain network that respects their data sovereignty requirements

azure-storage-table-logo-A474F6AD9A-seeklogo.com

Azure Blob storage options

Larger data sets can extend to off-chain storage using Azure Blob storage. Further options for multi cloud storage are also available.

Getting started with LogLocker

How does LogLocker work?

KQL

Targeted protection

LogLocker targets the specific logs a client needs to capture using KQL queries run from Sentinel against Log Analytics and Azure Data Explorer. The LogLocker automation is then simply added to the query workbook.

Sentinel

Sentinel triggers

When a Sentinel alert is triggered, LogLocker will request the KQL and run the specific query against either the Log Analytics Sentinel workspace or Azure Data Explorer (ADX).

Byzgen -Private Blockchain-1

Stored logs

Only the logs a customer specifies are stored and preserved in LogLocker, ready for easy search, sharing and review.

LogLocker pricing

Business

from $2850/mo

Best for smaller log volumes. Allows a customer to retain and manage high-value logs quickly and easily


  • Checkmark Single tenant
  • Checkmark Sentinel connector
  • Checkmark Private blockchain
  • Checkmark On-chain storage
  • Checkmark Elastic search

Premium

from $8350/mo

All the Business and Enterprise features plus API integration and 3rd party data sharing


  • Checkmark Single tenant
  • Checkmark Sentinel connector
  • Checkmark Private blockchain
  • Checkmark On-chain storage
  • Checkmark Elastic search
  • Checkmark Azure Off-chain storage
  • Checkmark ADX search
  • Checkmark Public blockchain options
  • Checkmark AWS & GCP Off-chain storage options
  • Checkmark API Access
  • Checkmark 3rd party permissioned data sharing
What happens when during a marketplace purchase?

LogLocker is easy to deploy - with experts on hand to help

Azure users with a Sentinel subscription can easily implement LogLocker.

Once a client is committed to buying here's what happens next:

  1. They book an installation call with our engineering team
  2. Or, if there are immediate questions, a call with one of our team can be booked ahead of the installation meeting.
  3. Full details of prerequisites are provided ahead of the installation meeting.
  4. The LogLocker installation is completed within 5-working days once meetings are confirmed and pre-requisites are in place
AdobeStock_455812073
The challenges LogLocker solves

Logs are ever more critical for digital compliance and security

  • Increasing cyber security costs

  • Streamlining security and compliance teams

  • Retention of high value logs for long periods

  • Increasing volumes of telemetry data

Your clients want ways to do more with less and drive value from existing security investments

Your customers' investments in SIEM (Security Information and Event Management) are likely significant. To truly reap the benefits of SIEM, they need to be sure that their security and compliance teams are getting the most value out of this powerful tool. Imagine a Venn diagram where the circles of security and compliance overlap. The sweet spot in that overlap is where SIEM should reside. This is where it becomes more than a tool—it transforms into a bridge, uniting these typically isolated areas to unveil insights and boost efficiency. By working together with LogLocker, security and compliance teams can turn SIEM into a valuable asset that shields an organisation from cyber threats and regulatory pitfalls.

Your clients need to avoid siloed teams by reusing skills, data and functionality 

The disconnect between siloed security and compliance teams creates a critical blind spot. Security, focused on real-time threats, overlooks long-term compliance gaps. Compliance, chained to checklists, misses dynamic security risks. This double vision leaves vulnerabilities unseen and unaddressed, potentially increasing audit time and fines and ultimately weakening overall defence. Breaking down these silos and forging a shared view through integrated tools and proactive collaboration is key to achieving resilient security and seamless compliance.

Native options are not suitable for long-term log retention - they are costly, unable to accommodate custom data types and lack effective preservation capabilities

Safeguarding information against the relentless march of time is a complex juggling act demanding constant vigilance and resourcefulness. Storage technology constantly evolves, demanding data migration to survive, while physical media degrades, necessitating backups and redundancy measures. Data formats and software compatibility become obsolete, requiring costly conversions to maintain accessibility. Privacy concerns escalate with lengthy retention, demanding meticulous access control and potential anonymisation. The sheer volume of data can become unwieldy, requiring efficient archiving and retrieval strategies.

Your customers need tools to enable selection and filtering of logs to ensure that only those with value are processed and retained. Retaining unfiltered logs is not a sustainable option given data growth and increased regulatory requirements.

The deluge of log data threatens to engulf organisations like a rising tide. Each click, sensor ping, and system event spills into the reservoir, and the torrent shows no signs of slowing. Existing tools strain under the pressure, buckling under the ever-growing weight of analysis and storage demands. Future projections paint an even bleaker picture, with data volumes set to explode exponentially. This tsunami of information threatens to drown your customers' ability to identify critical security events and maintain regulatory compliance. Navigating this data deluge requires innovative solutions, from intelligent filtering and compression techniques to scalable storage architectures and AI-powered analysis tools. Only by riding this wave of data, not succumbing to it, can you help your customers unlock the valuable insights hidden within.

One compliance tool to rule them all