CATALOG DOWNLOAD

  • HOME
  • Catalog Download

We have prepared a wide range of materials, from materials
that give an overview of business introductions to log white papers and case studies.

ALog Series

Product overview Documents

  • ALog series product overview
    Document

    ALog series product overview material
    Introducing ALog Converter / ALog Converter DB / ALog EVA
  • Resource Athlete product overview
    Document

    Resource Athlete product overview material
    Introducing Resource Athlete

White Paper

  • [2020 latest version]
    This is all you need to know!
    The definitive guide
    to log management

    This is all you need to know! The definitive guide to log management
    It is a collection of log management know-how that can be used by both beginners and experts.
  • Visualization of
    threats by SIEM Automatically detects invisible Cyber Attacks [2020 latest version]

    Visualization of threats by SIEM
    From the basics of [why not notice cyber attacks] to [creating a concrete mechanism for automatic detection].
    Introducing efficient cyber security measures from the perspective of log management.
  • Microsoft 365
    Log Management
    Practice Guide

    Microsoft 365 Log Management Practice Guide
    Introducing a method to automatically manage "security measures for cloud services" using Microsoft 365 as an example.
  • Cyber attacks targeting teleworker.Your PC is exposed to
    attackers from the Web

    Cyber attacks targeting teleworker. Your PC is exposed to attackers from the Web
    A telework environment that is a hotbed for cyber attacks. Where is the threat lurking? Introducing the points of countermeasures while unraveling the attack method.
  • Future Information
    Leaks Prevented by AI
    Internal Fraud
    Countermeasures

    Internal Fraud Countermeasures
    IInformation leakage incidents with a loss of over 400 million yen can occur on a daily basis! Based on damage cases mainly due to internal fraud, we analyze information leakage routes and introduce efficient monitoring points.
Back to top