• HOME
  • Whitepaper Download
  • Download Form
  1. Enter your inquiry
  2. Content checklist
  3. Reception completed

White Paper

Visualization of threats by SIEM

Automatically detects invisible Cyber Attacks [2020 latest version]

From the basics of [why not notice cyber attacks] to [creating a concrete mechanism for automatic detection].
Introducing efficient cyber security measures from the perspective of log management.

Recommended for you like this

  • 1

    I want to know
    the methods and
    countermeasures of
    targeted attacks

  • 2

    I want to know
    the automation
    method of
    security operation

  • 3

    I want to use
    logs for cyber
    security measures


Masanori Miyata
Amiya Co., Ltd.
Internal Control Consulting Senior Manager
Masanori Miyata

After joining Amiya, he has been involved in information security and IT governance consulting and internal audit support for major companies as a Certified Information Systems Auditor (CISA). In recent years, he has also engaged in solution consulting for visualization and effective use of logs according to various purposes such as cyber measures and work style reform. He also provides consulting not only to domestic companies but also to foreign-affiliated companies and local governments.

Thank you for requesting the document.
After the transmission is completed from the following,
we will send the document PDF download information in the automatic reply email.
Please note that we cannot respond to inquiries from individual customers.

*is a required input item.

Document Select
Company Name




About the information you entered

Amiya Co., Ltd. will comply with laws, regulations and internal rules regarding the protection of personal information and will implement appropriate management.
Please note that the personal information you enter may be used for the purpose of contacting you about seminars and providing information about our products and various events.
In addition, we will not use it for any purpose other than contacting you and distributing information.
When we outsource our business and provide this information to other companies, we will select an appropriate outsourcer, conclude a confidentiality agreement with the outsource, and outsource under the supervision of our company.
For requests regarding disclosure of your personal information and requests for correction or deletion after disclosure, please contact us at the email address below.

Back to top