
Collect and centralize traffic data and log events from across your IT infrastructure — including network devices, firewalls, switches, operating systems, databases, and servers — through both Syslog and non-Syslog (Agent-based) sources, ensuring complete visibility and control.

Transform and store log data in an easy-to-understand, user-friendly format (Business Log), distinctly separated from the original log files (Original Log) that are securely preserved without any alterations.

Easily and quickly search, retrieve, and display log data with customizable filters such as Source/Destination IP Address, Time and Date, Source/Destination Port Numbers, specific conditions, keywords, and even full-text search capabilities.

Monitor and detect unusual events and threats (Monitoring) and alert the administrator (Alerting). Alert in case of problems with the source device, no logs sent to the system, abnormally high network usage, Uptime, Downtime.
Integrity

Verify the integrity, correctness and accuracy of Log data according to MD5 standards.

Define users, user groups, roles, and user access rights.

Not less than 90 days from the date the information entered the system, according to the Computer Act 2017, Section 26

Notify of abnormal or suspicious events occurring in the system using machine learning analysis techniques via the system's user interface, email, or Line notification, etc.

Dashboard for tracking unusual events Easily review in-depth data Customize the dashboard for comprehensive data analysis via the Web GUI management page. You can also create reports and dashboards for self-analysis based on events of interest.

Check system performance such as CPU Usage, Memory Usage, Hard disk Space and notify when errors occur.

Notify of abnormal or suspicious events occurring in the system using machine learning analysis techniques via the system's user interface, email, or Line notification, etc.

Analyze data, create reports and dashboards based on events of interest on your own.
