Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

ALog ConVerter and ALog ConVerter DB systematize the collection and examination of access logs to gather significant data. Utilizing patented translation technology, an extensive array of data access records is extracted from intricate system logs and synthesized into a comprehensible "access log" through a one-of-a-kind log analysis and conversion approach. The system automatically learns about each user's file access frequency and destinations. It assigns risk scores to any unusual activities, thereby uncovering potential fraud and attacks. By pre-setting alerts and reports, such as monitoring access to critical folders, users can enhance the efficiency of periodic audits and monitoring efforts. Furthermore, it enables the tracking of suspicious activities from multiple angles, including users who frequently fail login attempts and those who repeatedly delete files, ensuring comprehensive oversight. This proactive monitoring strategy fosters a more secure environment by identifying threats before they escalate.

Description

Gravwell is an all you can ingest data fusion platform that allows for complete context and root cause analysis for security and business data. Gravwell was created to provide machine data benefits to all customers, large or small, binary or text, security or operational. An analytics platform that can do things you've never seen before is possible when experienced hackers team up with big data experts. Gravwell provides security analytics that go beyond log data to industrial processes, vehicle fleets, IT infrastructure or all of it. Do you need to track down an access breach? Gravwell can run facial recognition machine-learning against camera data to identify multiple subjects who enter a facility with one badge-in. Gravwell can also correlate building access logs. We are here to help people who require more than text log searching and want it sooner than they can afford.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

SCYTHE
ThreatBlockr

Integrations

SCYTHE
ThreatBlockr

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

AMIYA

Founded

1996

Country

Japan

Website

amiya.co.jp/solutions/alog_converter/

Vendor Details

Company Name

Gravwell

Country

USA

Website

gravwell.io

Product Features

Log Management

Archiving
Audit Trails
Compliance Reporting
Consolidation
Data Visualization
Event Logs
Network Logs
Remediation
Syslogs
Thresholds
Web Logs

Server Management

CPU Monitoring
Credential Management
Database Servers
Email Monitoring
Event Logs
History Tracking
Patch Management
Scheduling
User Activity Monitoring
Virtual Machine Monitoring

Product Features

Data Security

Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance

Log Management

Archiving
Audit Trails
Compliance Reporting
Consolidation
Data Visualization
Event Logs
Network Logs
Remediation
Syslogs
Thresholds
Web Logs

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Alternatives

Alternatives

Atatus Reviews

Atatus

NamLabs Technologies
Corner Bowl Server Manager Reviews

Corner Bowl Server Manager

Corner Bowl Software Corporation