ALog Series
Product overview Documents
-
ALog series product overview
DocumentIntroducing ALog Converter / ALog Converter DB / ALog EVA -
Resource Athlete product overview
DocumentIntroducing Resource Athlete
White Paper
-
[2020 latest version]
This is all you need to know! The definitive guide
to log managementIt is a collection of log management know-how that can be used by both beginners and experts. -
Visualization of
threats by SIEM Automatically detects invisible Cyber Attacks [2020 latest version]From the basics of [why not notice cyber attacks] to [creating a concrete mechanism for automatic detection].
Introducing efficient cyber security measures from the perspective of log management. -
Microsoft 365
Log Management
Practice GuideIntroducing a method to automatically manage "security measures for cloud services" using Microsoft 365 as an example. -
Cyber attacks targeting teleworker.Your PC is exposed to
attackers from the WebA telework environment that is a hotbed for cyber attacks. Where is the threat lurking? Introducing the points of countermeasures while unraveling the attack method. -
Future Information
Leaks Prevented by AIInternal Fraud
CountermeasuresIInformation leakage incidents with a loss of over 400 million yen can occur on a daily basis! Based on damage cases mainly due to internal fraud, we analyze information leakage routes and introduce efficient monitoring points.