We understand that you may still have questions. That’s why we’ve compiled the most frequently asked questions here and will add more answers over time. Still can’t find what you’re looking for? Feel free to get in touch with us – we’re happy to help.
No, Fryqua is not a SIEM (Security Information and Event Management) solution. Instead, we focus on another essential aspect of your security strategy.
A SIEM is designed to collect, analyze, and correlate log files and events from various systems to detect cyber threats. It helps security teams monitor network and system activities and respond to threats by generating real-time alerts.
Fryqua, on the other hand, focuses on monitoring data activities and access management. We provide insights into who has access to your sensitive data, how that data is being used, and whether that usage complies with regulations such as GDPR and NIS2. Rather than monitoring network or system events, we focus on what happens with the data itself, detecting unauthorized access or suspicious patterns in data usage in real time.
In short, while a SIEM helps detect threats at the system level, Fryqua offers deeper control over data activities and access. Together, these solutions form a layered security approach, with SIEM addressing external threats and Fryqua ensuring protection and compliance within your organization.
Most organizations invest heavily in firewalls, endpoint security and network monitoring. Logical, but these only protect the outer shell. What if the threat is already inside your organization?
Where traditional solutions stop at the front door, Fryqua goes further.
Fryqua is an agent-based solution that provides insight deep into your IT environment at file, user and system level. What sets us apart is the ability to recognize normal versus abnormal internal data usage and user behavior, fully in line with your security policy. We do this by correlating different log sources, originating from various system components, with each other. This allows us to clearly identify internal risks and unwanted activities. Consider:
Fryqua translates access, user and system data into insights that can be converted into improvements. In doing so, we strengthen your existing security stack, not by replacing it, but by supplementing it with critical insights that other solutions lack.
Do you dare to answer these questions honestly?
Fryqua helps you answer these questions. We efficiently bring abnormal behavior to light and effectively make risks visible before they cause major damage.
Because trust is good. But knowing who is really working with your data, that is data security.
Here’s how Fryqua further strengthens the security provided by MDR, EDR, XDR, and SIEM:
1. Complementing MDR (Managed Detection and Response):
MDR services focus on externally managing and responding to threats in your network and endpoints. Fryqua complements this by taking a deep dive into internal data activities and access management. While MDR monitors external threats, Fryqua ensures you know who within your organization has access to sensitive data and helps prevent internal data leaks and misuse.
2. Complementing EDR (Endpoint Detection and Response):
EDR focuses on protecting endpoints such as laptops and servers against threats like malware and ransomware. Fryqua goes further by monitoring data activities at the file level. This means that in addition to device protection, you also gain visibility into who is accessing, editing, or sharing sensitive data, helping to manage both internal and external risks.
3. Complementing XDR (Extended Detection and Response):
XDR combines threat detection across endpoints, networks, and cloud services to provide a broader view of security risks. Fryqua enhances XDR by offering in-depth control over data activity and access patterns within the organization. While XDR correlates external attacks, Fryqua ensures visibility into how your sensitive data is used internally and where potential risks lie.
4. Complementing SIEM (Security Information and Event Management):
SIEM collects and correlates logs from systems and networks to detect threat patterns. Fryqua adds specific access management and compliance monitoring by providing insights into who has access to what data, along with detailed audit trails and compliance reports. Fryqua simplifies compliance with regulations such as GDPR and NIS2, while SIEM focuses on broader threat detection.
Fryqua adapts to your organization and can be flexibly deployed as an on-premise, SaaS, or PaaS solution.
Whether you're operating within a highly secure IT environment or prefer the flexibility of the cloud, Fryqua integrates seamlessly with your organization’s existing infrastructure and specific requirements.
If you opt for an on-premise installation, Fryqua is deployed on a dedicated server within your own IT environment. Full control and management remain with your internal IT team or trusted IT partner. No internet connection is required to operate the solution, allowing you to maintain complete autonomy over your IT infrastructure—ideal for environments with strict security requirements.
At no point do we have access to the system or your data, not even during updates. Only when you explicitly grant permission and temporarily provide remote access can we offer remote support.
Prefer a cloud-based solution? Fryqua is also available as a SaaS (Software-as-a-Service) and PaaS (Platform-as-a-Service) offering, delivered through our carefully selected partner providers. Even in these forms, our high standards for data access, privacy, and control remain fully upheld.
on the needs and infrastructure of your organization.
With an on-premises installation, Fryqua Data/Infra is placed on a dedicated server within your own IT environment, fully managed by your IT team or IT partner. We do not have access to the system or the data, not even during updates, unless you give explicit permission for this.
Fryqua is also available as SaaS (Software-as-a-Service) and PaaS (Platform-as-a-Service), delivered via our partners. The same strict guarantees regarding data access, privacy and control also apply in these cloud variants."
No. Our solution is designed to seamlessly integrate with your current infrastructure. Typically, we can go live within a day, but the timeline may vary depending on defining rules, connecting network components, and coordinating with your IT provider. All we require is a dedicated server to collect data from the sources you wish to monitor for risk, and the deployment of our agents on your computers and servers.
No. Our customers are the owners responsible for the data they create and store on a dedicated Fryqua server. We provide the tools and support to improve their security landscape.
No. We do not have access to our customers' data. All data is stored on a dedicated server either at the customer's location or with their preferred provider.
Yes. We understand that organizations may undergo changes like mergers or reorganizations. That's why our customers can reduce the number of computer users by up to 10% during their license term, and the license fee will be adjusted accordingly. Furthermore, they can always increase the number of computer users with no maximum limit, and the license fee will remain the same throughout the term.
Yes. We acknowledge that budgeting for security challenges can be tough. We often provide discounts to new customers to help them experience the added value we bring to their security environment. Existing customers can also receive discounts by extending their license terms for a longer period.
Yes. We offer a partner and referral program. Please get in touch with us for more details.