





Why you should store your logs?

Improve network perforormance
Keeping completed log records can help identify and resolve network issues.

Forensic analysis
Logs can be used as evidence in legal proceedings can forensic investigations.

Faster incident
response time
Storing logs allows organisations to quickly identify and contain security incidents.

Supporting regulatory compliance
Logs can be used to demonstrate compliance with regulatory requirements, reducing the time and effort for compliance audits.

Threat intellence
By analysing logs, organisations can identify indicators of compromise (IOCs) and other threat intelligence.

Risk management
By storing logs, organisations can identify potential risks and take steps to mitigate them.
What are system logs?
A system log is a record of everything that happens on a computer. It keeps track of things like when someone logs in or out, when a program starts or stops running, or when there is an error or problem with the computer.
Click the button and see what types of logs do StormEye support
The hidden power of logs
Understanding Computer Log Data


Log
A log is a record of events that occur within a computer system, software application, or network. These records are generated automatically and can include information about errors, user activity, and other relevant data points.
Logs are used for troubleshooting, performance analysis, security monitoring, and compliance purposes.

Log Archival System
A log archival system is a system that is designed to collect and store log data generated by computer systems, applications, or networks over a long period of time.
The system provides a secure and scalable way to store log data, which can be used for troubleshooting, performance analysis, and compliance purposes. Archival systems also enable organizations to search and analyze historical data to identify trends and patterns in system behaviour and usage.

Our supported log types
What log type can StormEye collect and process?
Opearting System Log
An operating system is software that manages hardware resources and provides common services for computer programs.
Infrastructure Log
An infrastructure log refers to the record of events or transactions that occur within the underlying hardware and software of a technology system.
Web Log
A web log, or weblog, is a record of events or transactions that occur within a web server or web application.
Custom Log
A custom log is a log file that contains specific data points that are not included in standard logs. It is tailored to the needs of the organization.
Database Log
A database log is a record of events or transactions that occur within a database management system (DBMS) or database application.






Request a walkthrough
We know sometimes it feels more comfortable to meet someone and ask questions, please leave your details and we will arrange a meeting asap.
35 Tseuk Luk Street,
San Po Kong, Kowloon
HKSAR