1. Enter your inquiry
  2. Content checklist
  3. Reception completed
Visualization of threats by SIEM


Visualization of threats by SIEM

Automatically detects invisible Cyber Attacks [2020 latest version]

From the basics of [why not notice cyber attacks] to [creating a concrete mechanism for automatic detection].
Introducing efficient cyber security measures from the perspective of log management.

Recommended for you like this

  • 1

    I want to know
    the methods and
    countermeasures of
    targeted attacks

  • 2

    I want to know
    the automation
    method of
    security operation

  • 3

    I want to use
    logs for cyber
    security measures


宮田 昌紀(みやた まさのり)
Amiya Co., Ltd.
Internal Control Consulting Senior Manager
Masanori Miyata

After joining Amiya, he has been involved in information security and IT governance consulting and internal audit support for major companies as a Certified Information Systems Auditor (CISA). In recent years, he has also engaged in solution consulting for visualization and effective use of logs according to various purposes such as cyber measures and work style reform. He also provides consulting not only to domestic companies but also to foreign-affiliated companies and local governments.

Thank you for requesting the document.
After the transmission is completed from the following, we will send the document PDF download information in the automatic reply email.
Please note that we cannot respond to inquiries from individual customers.

Product Name Visualization of threats by SIEM
Company Name



Back to top