Skip to content

Xiaa Solutions

Cyber Security and IT Management Solutions

Jason

Application Discovery and Dependency Mapping

Application Discovery and Dependency Mapping (ADDM) discovers applications running on servers and network devices within the network infrastructure, and maps the dependencies between them. It aids in discovering, mapping, and is critical when considering Cloud migration.

Read More »
Jason

Improve your factory’s efficiency

Manufacturers are hit by big challenges, macro factors such as Brexit, Covid and supply issues, which effect the productivity of your factories. So all the more reason for better controls and monitoring of each step in the process to ensure maximised efficiency.

Read More »
Data pipeline for Observability
Jason

What is Cribl Logstream

The challenge of too much data is that alot of it is rubbish and needs to be deleted. The trouble is that Log Management solutions license their software on data volumes which is counter-intuitive.

Read More »
Jason

SIEM solves IT

Increasingly Businesses are turning to Cloud SIEM solutions which can converge different 3rd party Security solutions in a single integrated platform that displays alerts in real-time and provides a drill down to identify the culprit and act upon it.

Read More »
Jason

Case Study – West Midlands Ambulance Service

Sumo Logic for 3 key reasons:
It was very easy to deploy and then use within a few hours. Data could be forwarded into a central server and then encrypted to Sumo Logic. This made it secure and easy to install. It was also commercially advantageous. Xiaa Solutions were able to meet the budget.

Read More »
Jason

The Proactive CISO

A root question for Cyber Security implementation is what standards to follow and what
policies to implement.

Read More »