CYBERSEC EXPO 2019

The largest CYBERSEC EXPO in Taiwan, A Collection of Solutions in Cyber Security

MAR.19 - 21

Taipei International Convention Center
Taipei World Trade Center Hall 1, 2F

銀級

AMIYA

Founded in December 1996, Amiya Corporation offers total solutions for ICT infrastructure, centered on SAP (Security Audit Product business), development and sales of security measures software "ALog series" and IT foundation business, design/constructing secure IT network.
In 2013, AMIYA awarded the Gold Prize in the Info Security Products-Global Excellence Awards, Products and Solutions for Asia-Pacific-categories.
With this, AMIYA has won the reputation as one of the leading ICT solution providers in Asia-Pacific.
Today, AMIYA Corporation is a leader in developing and delivering innovative, future-oriented ICT security infrastructure, making society better by connecting the world and the people living in it.
 

Insider ThreatData SecuritySIEM

ALog

Released originally in September 2005, ALog ConVerter is an agentless (non-resident program) access log management tool. ALog ConVerter takes a server event log and looks for file access, domain logins, and other activity, providing all-in-one proprietary analysis and file compression for long-term storage. 

ALog EVA is the latest product in the ALog ConVerter series, the No.1 seller in the server access market for 11 consecutive years. ALog EVA takes ALog Convertor to a new level by making it possible to detect irregular or illegal activities through a wider range of big data by various network devices and application logs via advanced correlations techniques.
 

Insider ThreatData SecuritySIEM

ALog ConVerter

•    Server Access Log Management
•    Acquires server access from layers of Operation System (OS)
•    Integrated log management system of multiple servers 

Insider ThreatData SecuritySIEM

ALog ConVerter DB

•    Database Log Management
•    Acquires log from the database application layers
•    Stores scattered database logs as a unified data

Insider ThreatData SecuritySIEM

ALog EVA

•    Simplified SIEM 
•    Expands the domain of ALog protection
•    Unifying log product 
 

Insider ThreatData SecuritySIEM

Resource Athlete

•    Server Management 
•    Multifunctional server management tool
•    EX) Identifying access permission information of particular folders, eliminating  unnecessary files, etc.  

ALog ConVerter(Data Security Management/logging management )

  • ALog ConVerter

    Centralization of all data into a single, secure location Immediate and intuitive pull-out of all essential items.
    ALog ConVerter centralizes logs in file servers storing important enterprise data and analyzes complex system logs with our proprietary
    logic and converts them into readable access logs. Using this converted log data enables a clear understanding of access activity, intuitive
    searches and reports via a web browser, thus facilitating monitoring and protecting enterprise-critical data.
     

  • ALog ConVerter DB

    Protecting your database – Monitoring access to valuable data actions taken by DB administrators
    Incidents or accidents such as data leaks and falsification can badly damage your organization. With its focus on database activity, ALog ConVerter DB is an access log management tool that enables users to monitor “when, who and what” with regard to critical data including customer information.

  • ALog EVA

    Manage and monitor your logs from various perspectives Ranging from network devices to web servers
    ALog EVA is an integrated log management tool; helping you discover visits to career sites via Web proxy or monitor workers’ excess overtime from time cards, so as to uniformly manage all records of activity.

  • Resource Athlete

    Easy reporting of operational statuses of files, access privileges and accounts
    Resource Athlete is a full-featured server management tool, providing a comprehensive visual insight into
    server resources including change and management of Folder Access privileges or sweeping large numbers of unnecessary files. 

Data Security Measures—ALog ConVerter

Today’s information systems encompass an increasingly diverse range of IT devices. How do you monitor device access without adding to your stress and cost? Reduce stress and cost by monitoring important data centrally from the server. Log management without relying on client devices. ALog ConVerter is the answer.


Product Type

Insider ThreatData SecuritySIEMInsider ThreatData SecuritySIEMInsider ThreatData SecuritySIEMInsider ThreatData SecuritySIEMInsider ThreatData SecuritySIEM