Log Monitoring

Big Data Meets Cyber Security and Protection

Today, it is almost impossible to discern between the events within your environment that are relevant to security versus those that are not. This is due to devices and technologies such as network firewalls, intrusion detection and prevention systems (ID/PS), VPNs, routers and switches, business-critical systems, noncritical servers and an overabundance of endpoints in your organization generating large amounts of logs.

Hitachi Systems Security’s Log Monitoring service offers timely and accurate identification of security-relevant events to ensure that you are responding to valid threats, that you are applying the right response and that your critical assets are properly protected at all times.


Security Log and Event Collection

Our proprietary ArkAngel Platform collects security log and event information from all devices on your network, including all security devices in addition to database and application servers and even iSeries AS 400 systems. Specific logs are analyzed according to the use cases identified by our clients, policy violations, intruders’ actions and breach validation.

This comprehensive and technology-agnostic approach is a key factor in our ability to deliver comprehensive coverage of your network and the best protection possible against the most sophisticated cyber attacks.


Log Retention

Log Retention improves the ability of detecting new anomalies threatening the security of your critical assets. Hitachi Systems Security’s Log Retention service makes it easy for you to comply with different regulations while reducing the hassle, cost and overhead related to collecting, storing and reporting on logs from hundreds of security and networking devices, applications, database servers, and other systems. Logs are securely retained and remain accessible on demand through the ArkAngel management portal.

Retained logs cannot be modified by internal or external hackers.


Office 365 Cloud Security and Log Monitoring

By collecting additional Office 365 security logs, Hitachi Systems Security’s connector can help your organization improve your security posture, respond to security incidents and secure your data in the cloud.

Learn more about Office 365 Log Monitoring


Log Correlation

Hitachi Systems Security’s advanced proprietary log correlation engine allows us to detect the most sophisticated cyber attacks by analyzing and correlating raw systems and security logs to identify trends over an extended period of time. ArkAngel’s advanced log correlation engine, combined with our highly-skilled and dedicated security team, will filter out all false positives, identify real security events and cyber threats that need to be addressed, and work with your team to eliminate them. In addition, ArkAngel can automatically detect the use cases that our clients are interested in.

office meeting


ATM and POS Monitoring

Hitachi Systems Security has developed a ATM and POS Monitoring service as part of our managed security service and allows our analysts to monitor the security of your ATMs and network.

Learn more about ATM and POS Monitoring

Log Monitoring Benefits

Capture and store customer-specified system logs from IT devices, systems and other network assets to the log retention appliance

Implement software upgrades and security patches to log retention appliances

Adhere to internal policies and regulatory compliance requirements, such as GLBA, PCI DSS and HIPAA

Monitor the information security, system health and performance of log retention appliances 24/7

Provide customers with online and on-demand log access

Talk to a security specialist

Protect your business today