MylogStar is a specialized product for client operation log management.
Client operation logs are essential in implementing detailed user trail management to enhance your IT security.
MylogStar has a superb log collection ability to obtain accurate PC operation logs, regardless of physical or thin client operating environments.Its intuitive management screen allows you to manage and utilize the acquired PC operation logs efficiently.
Log Collection Ability
When you perform log management, you cannot save or analyze logs as trails unless you have the necessary logs.
MylogStar acquires logs at the kernel level of the OS. This enables you to grasp the operations whose logs cannot be acquired by other log management products.
The acquired logs are highly accurate and can be utilized for information leakage prevention and work improvement.
Log Utilization Ability
No one knows when the collected logs will be used. If an information leakage is suspected, it may be necessary to check the logs spanning the past several years. These logs are meaningless unless they are readily usable. Building on years of experience in providing specialized software for client operation log management, MylogStar offers easy-to-use operation management to users.
Operating Environment Compatibility
An enterprise system has a mix of different environments operating in it. Such a mix may include a virtualized environment, a thin client environment, and even a foreign-language OS if your company has branches and affiliates overseas. MylogStar is designed to work even under such circumstances.
Log Analysis Ability
Using the log data stored in the MylogStar Server, you can create detailed reports. Analyzing these reports to examine the PC usage status of users from multiple angles gives you a set of indicators for enhancing your IT security. For example, the alert report and file take-out report helps you identify security incident trends. The computer usage status report enables you to grasp the login status on a department-by-department (or user-by-user) basis. You can also identify those clients that log in outside working hours such as on holidays and during the nighttime.