Collection, selection and archiving of selected system logs

The IT trend of today is security. One of the cornerstones of monitoring the security of your IT organization is not only collecting, but more importantly, processing relevant logs from your applications and infrastructure.

If you are already collecting logs from various sources, you also want to be able to easily search through them and always have a clear view of them.

Of course, you want to know how to analyze the logs and quickly get answers to questions about potential problems with your data security. At the same time, you can meet the strict requirements of security audits from both customers and the relevant authorities under the GDPR.

We have extensive experience with the deployment and subsequent management of SIEM – Security Information and Event Management as a superstructure of LM – Log Management. We use a combination of the most proven tools on the market such as Logstash, ElasticSearch and Kibana.

Your contact person

Karel Fišnar

Head of Cloud Solutions & Services
Detail