We will centrally manage all logs to investigate the causes of failures and detect threats.
- Centralized management of all logs You can centrally manage logs that were previously scattered, such as those from AWS, Office365, and client-side logs. - Quick implementation and operation start with abundant templates With a wealth of templates for queries and dashboards necessary for log analysis, you can start operations immediately. Since logs and metrics can be operated through a single UI, the efficiency of troubleshooting is also improved. - A cost structure that can flexibly respond to rapid data growth Costs are determined based on the average data volume rather than the maximum value, resulting in high cost performance. Even if there is a spike to more than ten times the contracted data volume, the system will not stop.
Inquire About This Product
basic information
Our company, Computer Science Co., Ltd., has started handling Sumo Logic products. By utilizing the log management service Sumo Logic for system operations, you can quickly identify and address the causes of failures, as well as notice signs before a failure occurs. Additionally, you can use it as a security measure to discover potential threats and signs of breaches by combining it with the threat intelligence database CROWDSTRIKE. *The threat intelligence database CROWDSTRIKE is available for free.
Price information
The capacity of the logs and the operational support services will affect the price. Please feel free to consult with us.
Delivery Time
※It is possible to evaluate the product in advance through a PoV (Proof of Value).
Applications/Examples of results
- Log analysis of cloud platforms such as AWS - Log analysis of SaaS services like Office365 - Analysis of client logs from PCs and smartphones, etc. In addition to improving and streamlining server operations, we can also collect client-side logs, which have become increasingly important for remote work.
Detailed information
-
SumoLogic will solve your log management problems.
-
You can import and analyze various logs.
-
Since an application catalog is available, you can streamline the design of operations.
-
It is an intuitively easy-to-understand dashboard.
-
It can also be used for threat detection and SIEM.
Company information
Our company is a system integrator that contributes to the creation of corporate value for our clients as their main IT partner. Since our founding in 1985, we have been focusing on developing our business around general-purpose systems (IBM mainframes) and open systems (Unix, Linux, Windows, etc.) with the aim of solving our clients' problems. Please feel free to contact us if you have any inquiries.