TOGETHER, WE
RESPOND
FASTER
CYBERSEC 2019
Taipei International Convention Center
Taipei World Trade Center Hall 1, 2F
Post on/ | 2019/01/20 13:Sunday
In light of the sophistication and evolution of cyber attacks and diversifying insider breaches, “log management” is absolutely critical for information systems. Pinpointing key points of when/who/what not only provides clues to uncovering wrongdoings but also facilitates the implementation of preventative measures. Accurate record keeping also helps in tracking the past data without which we would know nothing. Log collection and utilization are the most basic best practices for security. Data logs collected today may have a great influence on the resolution of future incidents/accidents.
ALog ConVerter
Centralization of all data into a single, secure location immediate and intuitive pull-out of all essential items.
ALog ConVerter centralizes logs in file servers storing important enterprise data and analyzes complex system logs with our proprietary logic and converts them into readable access logs. Using this converted log data enables a clear understanding of access activity, intuitive searches and reports via a web browser, thus facilitating monitoring and protecting enterprise-critical data.
ALog ConVerter DB
Protecting your database – Monitoring access to valuable data actions taken by DB administrators.
Incidents or accidents such as data leaks and falsification can badly damage your organization. With its focus on database activity, ALog ConVerter DB is an access log management tool that enables users to monitor “when, who and what” with regard to critical data including customer information.
ALog EVA
Manage and monitor your logs from various perspectives - ranging from network devices to web servers
ALog EVA is an integrated log management tool; helping you discover visits to career sites via Web proxy or monitor workers’ excess overtime from time cards, so as to uniformly manage all records of activity.
Resource Athlete
Resource Athlete is a full-featured server management tool, providing a comprehensive visual insight into server resources including change and management of Folder Access privileges or sweeping large numbers
of unnecessary files.