Products
Log audit
Product Introduction
The Log Audit System can continuously collect the massive log information generated by the security equipment, network equipment, host, operating system, and all kinds of application systems of different manufacturers in the user network through the combination of initiative and passive methods in real time, and then transfer such information to the audit center for centralized storage, backup, query, auditing, alarm, response, and issue a report with rich content, to know the overall security operation situation across the network, and realize the full life-cycle log management.
Product Advantages
■ Meeting such requirement of the Cybersecurity Law that the logs shall be stored for at least 6 months;
■ A log auditing system meeting the requirements for hierarchy protection, compliance, and internal control;
■ It is the basic platform for comprehensive and integrated auditing of information systems;
■ A log audit system embodied with high performance acquisition and processing capability;
■ Supporting distributed log collection and event storage, audit center cascading, and large-scale deployment;
■ With minimum impact on the user network and services: While implementing centralized log auditing of IT facilities in the user network, various technical means are adopted to minimize the impact on the user network and services;
■ Having a complete self-security design to ensure that the system's own security level meets the user's overall security policy;
■ The domestic log audit system with the most successful application cases of users in various industries;

Service hotline:
400-810-7766 (24H)
E-mail:
shfw@leadsec.com.cn
Address:
Zhongguancun, 8 dongbeiwang west road, haidian district, BeijingSoftware park 21