Skip to content
    Security & Reliability

    The Blumira Mission

    Security and reliability are the backbone of Blumira’s service. We are dedicated to providing excellence in customer experience and protecting your organization.

    The Blumira Difference

    Our core values

    People
    People
    • Leaders in defensive security

    • Giving back to the security community

    • Deep security roots

    Process
    Process
    • Data security and integrity

    • Automatic updates

    Technology
    Technology
    • Detection

    • High-availability platform

    Compliance
    Compliance
    • Compliance for every industry

    • PCI DSS compliant

    • SOC 2 compliant

    The People, Processes, and Technologies To Succeed

    • Leaders in Defensive Security

      Blumira is co-founded by leaders in defensive and managed security, CSO Steve Fuller and CTO Matt Warner. CEO Jim Simpson’s user-centric approach to solving problems for customers is unique in an industry that is long known for overly complex, legacy solutions that often fail to protect organizations. Matt has over a decade of experience in IT and development, focusing on business strategy, development, compliance, threat detection and penetration testing.

    • Giving Back to the Security Community

      The security and incident detection team at Blumira writes detection rules that power the Blumira platform to help identify indicators of compromise early and often for our customers. They are also dedicated to contributing to the greater security community by developing open-source Microsoft tools (known as Flowmira and Logmira) to make threat detection and response easier for all organizations.

    • Deep Security Roots

      Sr. Incident Detection Engineer Amanda Berlin is a highly accomplished network defender, author of “Defensive Security Handbook: Best Practices for Securing Infrastructure” with Lee Brotherston, published by O’Reilly Media.

      The Blumira operations, marketing, sales, and engineering teams are composed of several experienced security professionals who previously held positions at Duo Security and Censys.

    • Data Security and Integrity

      By protecting log data both in transit and at rest, Blumira ensures attackers can’t gain access to your log archives to read data without the appropriate keys. Least privilege practices makes the Blumira log database accessible only to internal Blumira services and parties that require access. For data integrity, Blumira validates that incoming logs haven’t been tampered with through periodic review and internal processes, and provides alerts for file-integrity monitoring (FIM) technology whenever changes are detected.

    • Automatic Updates

      Blumira platform updates are cloud-delivered, sending them automatically to your organization to reduce any lag or downtime. This ensures that you’re detecting and alerting on the most important issues, around the clock. The Blumira engineering team develops and maintains parsers for a wide variety of technical integrations on an ongoing basis to save your team the time and resources of standardizing log data collection.

    • Our Detection Methodology

      The Blumira threat detection framework focuses on intrusion behaviors given the ubiquity of Living-Off-the-Land tactics, while also aligning with the MITRE ATT&CK Framework. Loud and/or inaccurate security products can easily lead to alert fatigue, resulting in customers that ultimately ignore their own security tools. With that in mind, the Blumira security team designs, tests, and curates threat detections to be high fidelity from the moment of deployment. All customers receive both a contextual analysis and explicit workflow steps to first qualify and then mitigate all detected threats.

    • High-Availability Platform

       Blumira leverages Google Cloud and Google Compute Platform (GCP) to provide a highly available security platform for our customers. Blumira maintains 99.99% uptime to ensure our service is always available and reliable.

    Blumira is co-founded by leaders in defensive and managed security, CSO Steve Fuller and CTO Matt Warner. CEO Jim Simpson’s user-centric approach to solving problems for customers is unique in an industry that is long known for overly complex, legacy solutions that often fail to protect organizations. Matt has over a decade of experience in IT and development, focusing on business strategy, development, compliance, threat detection and penetration testing.

    The security and incident detection team at Blumira writes detection rules that power the Blumira platform to help identify indicators of compromise early and often for our customers. They are also dedicated to contributing to the greater security community by developing open-source Microsoft tools (known as Flowmira and Logmira) to make threat detection and response easier for all organizations.

    Sr. Incident Detection Engineer Amanda Berlin is a highly accomplished network defender, author of “Defensive Security Handbook: Best Practices for Securing Infrastructure” with Lee Brotherston, published by O’Reilly Media.

    The Blumira operations, marketing, sales, and engineering teams are composed of several experienced security professionals who previously held positions at Duo Security and Censys.

    By protecting log data both in transit and at rest, Blumira ensures attackers can’t gain access to your log archives to read data without the appropriate keys. Least privilege practices makes the Blumira log database accessible only to internal Blumira services and parties that require access. For data integrity, Blumira validates that incoming logs haven’t been tampered with through periodic review and internal processes, and provides alerts for file-integrity monitoring (FIM) technology whenever changes are detected.

    Blumira platform updates are cloud-delivered, sending them automatically to your organization to reduce any lag or downtime. This ensures that you’re detecting and alerting on the most important issues, around the clock. The Blumira engineering team develops and maintains parsers for a wide variety of technical integrations on an ongoing basis to save your team the time and resources of standardizing log data collection.

    The Blumira threat detection framework focuses on intrusion behaviors given the ubiquity of Living-Off-the-Land tactics, while also aligning with the MITRE ATT&CK Framework. Loud and/or inaccurate security products can easily lead to alert fatigue, resulting in customers that ultimately ignore their own security tools. With that in mind, the Blumira security team designs, tests, and curates threat detections to be high fidelity from the moment of deployment. All customers receive both a contextual analysis and explicit workflow steps to first qualify and then mitigate all detected threats.

     Blumira leverages Google Cloud and Google Compute Platform (GCP) to provide a highly available security platform for our customers. Blumira maintains 99.99% uptime to ensure our service is always available and reliable.

    Industry Financial screenshot
    Your Compliance

    Compliance for Every Industry

    Blumira endeavors to meet many different compliance standards for logging, auditing, reporting, threat detection and more, including CMMC, NIST 800-171, NIST 800-53, PCI DSS, HIPAA and FFIEC compliance regulations for data security, confidentiality and integrity. 

    Learn more about compliance
    Industry Goverment screenshot
    Our Compliance

    SOC 2 Compliant

    Blumira undergoes a rigorous independent annual audit conducted by Insight Assurance to complete a SOC 2 (Service Organization and Availability Control) examination that ensures Blumira’s security protocols and use of data meet strict data security requirements established by the American Institute of CPAs (AICPA).

    View Our Trust Portal

    Get Started For Free

    Experience the Blumira Free SIEM, with automated detection and response plus compliance reports for 3 cloud connectors, forever.