min-width: mobile
min-width: 400px
min-width: 550px
min-width: 750px
min-width: 1000px
min-width: 1200px

Blog & News Category // Sagan Blog Post

Sagan Technology Latest Release Includes Malware Detonation

Posted by Kat Casey on September 05, 2017

JACKSONVILLE, Fla., Sep 05, 2017 (BUSINESS WIRE) -- Quadrant Information Security announces the next release of their Sagan Technology, which will include a new Malware Detonation component. This release will allow Sagan sensors the ability to extract files traversing the customer infrastructure, and detonate these files in a secure off-premise cloud environment.

“Adversaries are getting smarter and it...
Continue Reading

Sagan 3.0: New Features & Functionality

Posted by Kat Casey on November 29, 2016

We have been working on Sagan 3.0 for several months now, and wanted to share with you some of the new features and functionality that you will experience in the console and via Quadrant support.

Some of the new UI/UX feature updates include:

New framework being used, which provides more security in production, and...
Continue Reading

Dynamic Rules with Sagan.

Posted by Champ Clark on November 14, 2016

One of the biggest problems faced with log monitoring is ensuring that the proper rules are loaded. Just like with packet based IDS systems, during the installation and setup process, you typically enable the rules that you think are relevant to your environment. The problem is, environments change over time and we might neglect to go back and determine...
Continue Reading

UPDATED Easing the Compliance Burden :: Sagan & PCI Compliance (version 2 - new requirements)

Posted by Kat Casey on November 03, 2016

Article published/updated by: Drew Brunson, Senior Information Security Consultant, Quadrant Information Security

Difficulty achieving compliance with the Payment Card Industry Data Security Standard, the PCI DSS, sometimes can seem to spring from parts of the standard that seem fairly simple at first reading.

The requirement to track and...
Continue Reading

What the Sagan Log Analysis Engine Is…and What It Is Not.

Posted by Champ Clark on August 22, 2016

Article by Champ Clark III.

With so many log analysis tools out there, we sometimes see strange comparisons between the Sagan log analysis engine and unrelated tools. For example, people often ask how Sagan compares to Splunk.  In our opinion, these are two different tools with two different jobs.

For one, the...
Continue Reading

Easing the Compliance Burden :: Sagan Technology & PCI Compliance

Posted by Kat Casey on February 10, 2016

Article published by: Drew Brunson, Senior Information Security Consultant, Quadrant Information Security

For anyone tasked to ensure compliance with the 12 requirements contained in the Payment Card Industry Data Security Standard (PCI DSS), one requirement often causes unexpected difficulty, if only because of the variety of systems involved.

Requirement 10 of the...
Continue Reading

JunOS/ScreenOS Vulnerability Helps to Emphasize the Importance of Remote Log Storage

Posted by Kat Casey on December 21, 2015

Article written by: Adam Hall - 

2015-12-17 09:00:00 system warn 00515 Admin user username1 has logged on via SSH from

2015-12-17 09:00:00 system warn 00528 SSH: Password authentication successful for admin user ‘username1’ at host

According to the above log, user ‘username1’ has logged into a...
Continue Reading