CATALOG DOWNLOAD

We have prepared a wide range of materials, from materials
that give an overview of business introductions to log white papers and case studies.

ALog Series

Whitepaper

  • Starter Guide Log management

    Starter Guide Log management
    Logs are important data that can be used to solve a variety of corporate problems. This book introduces how logs can be used by those new to log management.
  • Minimize damage from cyber attacks with Active Directory!

    Minimize damage from cyber attacks with Active Directory!
    Focusing on the fact that all cyber attacks go through Active Directory, we will focus on Active Directory as a countermeasure against internal fraud, and explain AD countermeasures and AD log management.
  • Three pitfalls that can lead to overlooking logs

    Three pitfalls that can lead to overlooking logs
    We explain three typical oversights that can result from "unnoticed logs" and the operational issues that lie behind them.
  • The definitive guide
    to log management

    The definitive guideto log management
    It is a collection of log management know-how that can be used by both beginners and experts.
  • Visualization of
    threats by SIEM

    Visualization ofthreats by SIEM
    From the basics of [why not notice cyber attacks] to [creating a concrete mechanism for automatic detection]. Introducing efficient cyber security measures from the perspective of log management.
  • Microsoft 365
    Log Management
    Practice Guide

    Microsoft 365Log ManagementPractice Guide
    Introducing a method to automatically manage "security measures for cloud services" using Microsoft 365 as an example.
  • Your PC is exposed to
    attackers from the Web

    Your PC is exposed toattackers from the Web
    A telework environment that is a hotbed for cyber attacks. Where is the threat lurking? Introducing the points of countermeasures while unraveling the attack method.
  • Internal Fraud
    Countermeasures

    Internal FraudCountermeasures
    Information leakage incidents with a loss of over 400 million yen can occur on a daily basis! Based on damage cases mainly due to internal fraud, we analyze information leakage routes and introduce efficient monitoring points.

Product overview Documents

  • ALog Series
    Product Overview
    Document

    ALog SeriesProduct OverviewDocument
    Introducing ALog
  • Resource Athlete
    Product Overview
    Document

    Resource AthleteProduct OverviewDocument
    Introducing Resource Athlete
Back to top