

Overview
Security Information and Event Management
The security and information event management (SIEM), Security and IT compliance, must not be overlooked. They can impact to your business and reputation if some anomaly taking place. SIEM system and centralized logger. NetkaView Logger (NLG), able to analyze event data for detection of attacking and data breaches, then to collect, store, investigate and report on log data for incident response and regulatory compliance. NLG by using SIEM technology gathering event data or log data from IT devices, network infrastructure, systems and applications. SIEM technology will normalize the log data for analyzing purposes such as network and system security, users’ activity, anomaly events and compliance reports. NetkaView Logger (NLG), will be a part of your IT security policies, analyzing IT system, users’ activity, anomaly events and compliance reports.
IT security Compliance
Security and IT compliance, must not be overlooked. They can impact to your business and reputation if some anomaly taking place. SIEM system and centralized logger, like NetkaView Logger (NLG) and NetkaView Packet Analyzer (NPA), will be a part of your IT security policies, analyzing IT system, users’ activity, anomaly events and compliance reports.
NetkaView Logger (NLG) is a centralized log management solution that helps you to deal with large volumes of IT device-generated syslog messages. NLG supports log collection, centralized aggregation, long-term retention, log search and reporting.
NLG comes with real-time interactive web-based data visualization and Business Intelligence tools. The companies seeking IT compliance, detecting and identifying security events to reduce the impact of a security breach on your business. It is utilized to support IT infrastructure management in various areas e.g. Performance management, Traffic engineering, Flow analysis, Packet analysis, Security Information and Event Management (SIEM) and Anomaly detection.
What's New and Highlights
- Huge amounts of IT infrastructure generated events, metric, traces, network flow data and telemetry data often exceeds manageability. The lack of proper tools to analyze those massive data lakes can lead to overlook the really important information.
- Having too many tools to manage the IT systems including ITIM, ITSM, NPMD, SIEM, APM, DEM raises not only complexity but also increases both, Capex and Opex expenses.
- IT Operations often focus only on the IT department itself and misses out on valuable insights which can affect business growth, competitiveness and users or client digital experience.
- Centralized log management
- Real-time web based log monitoring and analysis
- Real-time web based packet/flow analysis and data visualization (5 sec to analyze & display with minimum 1 sec data granularity)
- Gain visibility & insight into your IT infrastructure for application & network performance, user experience and digital experience
- Log retention support
- Various log types support
- Support agent-based and agentless log collection
- Advanced event management include Event filtering, Event suppression, Event correlation
- Custom log parsing
- Custom Business Intelligent (BI) dashboard
- Real-time log dashboards
- Multiple predefined reports
- Alert via Email and LINE application
Physical Security
While deployed with access to the IP camera network, NLG can also receive and store video files. This enables the search, view and download of historical video files via NLG’s web GUI, filtered by IP camera hostname and required date/time. This powerful feature helps to enhance incident- and forensic investigations faster and with more accuracy.

