An incident of unauthorized access to a shared file server from a terminal infected with malware occurred.
Because the unauthorized access was discovered too late, a large amount of personal information was leaked.
–The limitations of raw log management led to the introduction of a specialized package.
The company had been managing logs using “raw event logs” until the incident occurred.
However, the event log is huge and requires a lot of expertise to decipher the content of user operations, making constant monitoring and fraud detection impossible.
In order to prevent such incidents from happening again, the company felt it was essential to create a system that could detect unauthorized access at an early stage, and decided to consider introducing a specialized log management package.
After comparative study based on the criteria of “domestic production” and “easy to install” and “low cost,” we decided to implement ALog ConVerter. As a result of comparative study based on the criteria of “domestic production,” “easy to install,” and “low cost,” we decided to implement ALog ConVerter.
The ALog ConVerter, of course, satisfies the requirement of domestic production.
In terms of ease of implementation, ALog ConVerter is a package optimized for each target server OS.
While other companies’ products required the creation of individual templates for log collection and complicated operations, ALog ConVerter is a package optimized for each target server OS.
In contrast, ALog ConVerter is a package optimized for each OS of the target server, so there is no cumbersome design, and its intuitive GUI was highly evaluated.
Currently, ALog produces reports focusing on operations by system administrators.
The level of fraud monitoring has been improved, and collaboration with supervisory departments has been greatly sped up.