-
Product Advantages
-
Product functions
-
Application scenarios
-
solution
-
Product Advantages
- Product architecture that integrates big data technology
High-performance log collection paradigm technology, big data distributed storage and indexing technology, and other technologies are adopted to support continuous massive log management.
- Diverse log collection capabilities
The system comprehensively adopts a variety of data collection technologies such as Syslog data collection, SNMP data collection, and data stream collection, which fully adapts to the actual network environment.
- Reliable security guarantee capabilities
Proprietary file-based database, built-in security firewall system and other functions are adopted to ensure the integrity, security and availability of log data.
- Dedicated log expert rule base
Classify log source data in real time and intelligently analyze abnormal information reflected in log information.
Product functions
- Log collection
It fully supports Syslog and SNMP log protocols, covering mainstream hardware devices, hosts, and applications, and ensuring comprehensive collection of log information.
- Image permission management
Image data isolation is supported, and different user access permissions can be set for images based on actual requirements.
- Unified processing of log formats
Log information in different formats is filtered, merged, and formatted in a unified manner, making logs easy to understand and analyze.
- Log analysis
Discover all kinds of security events and security threats that occur or hide in the network, and formulate filtering rules, correlation analysis rules, etc.
- Alarm display
The alarm information is displayed in a multi-dimensional graphical manner, and the alarm development trend is displayed on the time axis and the alarm details are displayed in the list.
- Log retrieval
You can retrieve the required log content through any field, and the query results can be drilled down and rolled up.
Application scenarios
-
Security and compliance
-
Traceability of security events
-
In order to meet the “Level 3” requirements of the Cybersecurity Law and the Cybersecurity Classified Protection, customers need to collect, store, process, and analyze logs in a unified manner through a log audit system.
-
Through the log expert rule base based on in-depth analysis of log content, the collected log data is dynamically analyzed in real time, and high-risk security events such as network illegal access, data violation operations, system process exceptions, and device failures are extracted from massive log data.
More options
Empower customers to quickly and securely migrate to the cloud,
If you have any questions about Inspur Cloud, please contact us
Are you interested in our solutions?
Please do not hesitate to contact us! We're here to help.