1~7 item / All 7 items
Displayed results
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationContact this company
Contact Us Online1~7 item / All 7 items
LogStare Collector is a domestically developed log management software created by Secureveil, which has been providing security operation services since its founding in 2001. ■ Three reasons to choose LogStare Collector - Compatible with Windows OS - Agentless, with minimal impact on existing environments - Clear pricing structure, with no limits on log volume or number of devices ■ Automate log collection, storage, and alerts In addition to Syslog, it supports log collection from Windows event logs, Microsoft 365, AWS, and other cloud services. Logs are collected from various systems and compressed for storage to one-tenth of their original size. Log searches, exports, and real-time alert settings can all be easily executed from a GUI, fully supporting the automation of log management. ■ Can also be used as a network monitoring tool Supports various monitoring protocols such as Ping monitoring, SNMP monitoring, and metrics monitoring. With rich visualization features, it provides a real-time monitoring screen that clearly shows where problems occur and a dashboard that allows for multi-faceted monitoring of system status, enabling intuitive understanding of the system's "current" state.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationLogStare Collector is a domestically developed log management software created by SecureVale, which has been providing security operation services since its establishment in 2001. ■ Three Reasons to Choose LogStare Collector - Compatible with Windows OS - Agentless, minimizing impact on existing environments - Supports logs from Windows servers and various cloud services ■ Automating Log Collection, Storage, and Alerts In addition to Syslog, it supports log collection from Windows event logs, Microsoft 365, AWS, and other cloud services. It collects logs from various systems and compresses them for storage at a ratio of 1/10. Log searches, output, and real-time alert settings can be easily executed from the GUI, fully supporting the automation of log management. ■ Compliance with Automotive Industry Cybersecurity Guidelines LogStare Collector can collect logs from various systems, and with its extended features, it can aggregate and analyze logs, thus complying with the log management requirements of "Label 23 Detection of Unauthorized Access" in the guidelines.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationLogStare Collector is a domestically developed log management software created by SecureVale, which has been providing security operation services since its establishment in 2001. ■ Three Reasons to Choose LogStare Collector - Compatible with Windows OS - Agentless, minimizing impact on existing environments - Supports logs from Windows servers and various cloud services ■ Automation of Log Collection, Storage, and Alerts In addition to Syslog, it supports log collection from Windows event logs, Microsoft 365, AWS, and other cloud services. It collects logs from various systems and compresses them for storage at a ratio of 1/10. Log searches, exports, and real-time alert settings can be easily executed from the GUI, fully supporting the automation of log management. ■ Ransomware Detection is Also Possible The audit logs of Windows servers collected by LogStare Collector are monitored by the SOC, which detects ransomware intrusion and lurking using its unique detection logic, preventing the expansion of damage. *Monitoring by the SOC is subject to a separate estimate.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationLogStare Collector is a domestically developed network monitoring tool created by Secureveil, which has been providing security operation services since its founding in 2001. ■ Three Reasons to Choose LogStare Collector - Compatible with Windows OS - Supports extended MIBs from various manufacturers and automatically recognizes monitorable items - Can also be used as a log management tool ■ Intuitively Grasp the "Now" of Your Internal Systems Supports various monitoring protocols such as Ping monitoring, SNMP monitoring, and metrics monitoring. With rich visualization features, you can intuitively grasp the "now" of your system through real-time monitoring screens that clearly show problem areas and dashboards that allow for multi-faceted monitoring of system status. ■ Can Also Be Used as a Log Management Tool In addition to Syslog, it supports log collection from Windows logs, Microsoft 365, AWS, and other cloud services. Logs from various systems are collected and compressed for storage at a ratio of 1/10. Log searching, output, and real-time alert settings can be easily executed from the GUI, fully supporting the automation of log management.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationLogStare M365 is a cloud service specialized in collecting audit logs from Microsoft 365 and visualizing user activity. It comes equipped with dedicated templates for analyzing logs from three perspectives: security, digital transformation (DX), and work styles. LogStare M365 regularly collects audit logs from Microsoft 365 and automatically performs log analysis, translation, report generation, and alerts based on specific conditions. Being a cloud service, it requires no burden of construction or maintenance, making operation easy.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThis document describes various risks arising from changes in work styles and the response measures, specifically "log management." It includes information on security in telework environments and "LogStare." "LogStare" is an integrated log management tool that not only allows for log collection and analysis but also has the capability to monitor systems and logs in real-time, providing comprehensive support for IT administrators' operational tasks. [Contents (excerpt)] ■ Introduction ■ New Threats ■ Why Telework is Targeted ■ Security in Telework Environments ■ Availability of On-Premises Access *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registrationThis document provides a detailed explanation of why a Security Operations Center (SOC) is necessary now. It includes discussions on security measures that do not create the triple burden of security operations or operational gaps, the establishment of SOCs, and the software "LogStare" that oversees SOCs. Our "LogStare" achieves all functions, including log collection and analysis, system uptime and performance monitoring, and future predictions using AI, all within a single software. [Contents (excerpt)] ■ The significant damage suffered by a certain company ■ Attacks on companies regardless of size ■ Even with the introduction of security products... ■ Serious shortage of information systems ■ The triple burden of security operations *For more details, please refer to the PDF document or feel free to contact us.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration