Log Audit System (LAS)

Log Audit System monitors and collects all kinds of information in the information system, and after standardization, filtering, merging and analysis, it is stored and managed in a unified format in the form of logs, combined with rich log statistical summary and comprehensive analysis functions, to achieve a comprehensive audit of the overall security status of the information system.

  • Product Advantages
  • Product functions
  • Application scenarios
  • solution

Product Advantages

  • Product architecture that integrates big data technology

    High-performance log collection paradigm technology, big data distributed storage and indexing technology, and other technologies are adopted to support continuous massive log management.

  • 安全.png
    Diverse log collection capabilities

    The system comprehensively adopts a variety of data collection technologies such as Syslog data collection, SNMP data collection, and data stream collection, which fully adapts to the actual network environment.

  • 产品功能.png
    Reliable security guarantee capabilities

    Proprietary file-based database, built-in security firewall system and other functions are adopted to ensure the integrity, security and availability of log data.

  • 产品功能.png
    Dedicated log expert rule base

    Classify log source data in real time and intelligently analyze abnormal information reflected in log information.

Product functions

  • Log collection

    It fully supports Syslog and SNMP log protocols, covering mainstream hardware devices, hosts, and applications, and ensuring comprehensive collection of log information.

  • Image permission management

    Image data isolation is supported, and different user access permissions can be set for images based on actual requirements.

  • Unified processing of log formats

    Log information in different formats is filtered, merged, and formatted in a unified manner, making logs easy to understand and analyze.

  • Log analysis

    Discover all kinds of security events and security threats that occur or hide in the network, and formulate filtering rules, correlation analysis rules, etc.

  • Alarm display

    The alarm information is displayed in a multi-dimensional graphical manner, and the alarm development trend is displayed on the time axis and the alarm details are displayed in the list.

  • Log retrieval

    You can retrieve the required log content through any field, and the query results can be drilled down and rolled up.

Application scenarios

  • Security and compliance

  • Traceability of security events

  • In order to meet the “Level 3” requirements of the Cybersecurity Law and the Cybersecurity Classified Protection, customers need to collect, store, process, and analyze logs in a unified manner through a log audit system.

  • Through the log expert rule base based on in-depth analysis of log content, the collected log data is dynamically analyzed in real time, and high-risk security events such as network illegal access, data violation operations, system process exceptions, and device failures are extracted from massive log data.

If you have any questions about Inspur Cloud, please contact us

Are you interested in our solutions?

Please do not hesitate to contact us! We're here to help.