Slide

Protect your business with powered log analytics

CALA Security

A Computer Traffic Data Logging System (Log of Event) that collects and stores event data generated from network devices, operating systems (OS) on servers, and various computer applications—such as routers, firewalls, switches, Active Directory servers, database servers, Windows servers, and application servers—in compliance with Thailand’s Computer Crime Act B.E. 2560 (2017). The system also analyzes security event trends within your organization’s network, providing real-time alerts to administrators for proactive monitoring, tracking, and prevention—before incidents escalate into costly damage.

Correlyze Advance Log Analytics

Beyond log management

Scalable architecture

Log data visibility & Log analytics

Flexible Dashboard

Proactive Protection

Easy & rapid investigation

Comply computer Act

Simple & affordable

Slide
Protect Your
Organization from
Cyberattacks

In today’s era of Digital Transformation, one of the most pressing challenges for every organization is safeguarding cybersecurity. Despite the best preventive measures, threats such as unauthorized access, data breaches, and the misuse of personal information by external actors continue to rise. These cyber threats can severely impact business operations, erode customer trust, and damage an organization’s reputation. That’s why Log Management and Log Analytics have become essential security technologies. They empower organizations to detect, analyze, and respond to increasingly sophisticated threats within complex IT environments that rely on numerous and diverse devices.

CALA Security Overview

How CALA Security helps organization?

Slide
Data Collection & Aggregation

Collect and centralize traffic data and log events from across your IT infrastructure — including network devices, firewalls, switches, operating systems, databases, and servers — through both Syslog and non-Syslog (Agent-based) sources, ensuring complete visibility and control.

Data Transform

Transform and store log data in an easy-to-understand, user-friendly format (Business Log), distinctly separated from the original log files (Original Log) that are securely preserved without any alterations.

Data Searching

Easily and quickly search, retrieve, and display log data with customizable filters such as Source/Destination IP Address, Time and Date, Source/Destination Port Numbers, specific conditions, keywords, and even full-text search capabilities.

Data Monitor & System Alert

Monitor and detect unusual events and threats (Monitoring) and alert the administrator (Alerting). Alert in case of problems with the source device, no logs sent to the system, abnormally high network usage, Uptime, Downtime.

Data
Integrity

Verify the integrity, correctness and accuracy of Log data according to MD5 standards.

User Management

Define users, user groups, roles, and user access rights.

Log Retention Period

Not less than 90 days from the date the information entered the system, according to the Computer Act 2017, Section 26

System Alert

Notify of abnormal or suspicious events occurring in the system using machine learning analysis techniques via the system's user interface, email, or Line notification, etc.

Dashboard Monitoring

Dashboard for tracking unusual events Easily review in-depth data Customize the dashboard for comprehensive data analysis via the Web GUI management page. You can also create reports and dashboards for self-analysis based on events of interest.

System Monitoring

Check system performance such as CPU Usage, Memory Usage, Hard disk Space and notify when errors occur.

Forensic Analysis

Notify of abnormal or suspicious events occurring in the system using machine learning analysis techniques via the system's user interface, email, or Line notification, etc.

Data Analyzer Create Report & Dashboard

Analyze data, create reports and dashboards based on events of interest on your own.

CALA Security

Beyond log management,
log analytics.

Contact Us