We have prepared a wide range of materials, from materials
that give an overview of business introductions to log white papers and case studies.
ALog Series
Whitepaper
Starter Guide Log management
Logs are important data that can be used to solve a variety of corporate problems. This book introduces how logs can be used by those new to log management.
Minimize damage from cyber attacks with Active Directory!
Focusing on the fact that all cyber attacks go through Active Directory, we will focus on Active Directory as a countermeasure against internal fraud, and explain AD countermeasures and AD log management.
From the basics of [why not notice cyber attacks] to [creating a concrete mechanism for automatic detection]. Introducing efficient cyber security measures from the perspective of log management.
A telework environment that is a hotbed for cyber attacks. Where is the threat lurking? Introducing the points of countermeasures while unraveling the attack method.
Information leakage incidents with a loss of over 400 million yen can occur on a daily basis! Based on damage cases mainly due to internal fraud, we analyze information leakage routes and introduce efficient monitoring points.