Best Services Under One Provider

Data Traffic Log
(Traffic Exchange)

Keep all computer traffic logs information according to the national law: Computer-related Crime Act B.E. 2550 (2007).

Manage data traffic
with confidence
  • Record all computer data traffic in a centralized secured system. No one can tamper with this data due to the web browser HTTPS extension and 128-Bit SSL encryption.
  • Search through indexed data traffic and generate different reporting style for corporate use.
  • Automatically compress data to save storage space.
  • Support data traffic in Syslog format and other formats coming from the following systems:
    • Operating System : Windows, Linux, AIX, HP, SUN, Unix
    • Database : DB2, Informix, MS-SQL, Oracle, Sybase
    • Application : IIS, Sun iPlanet, IIS, RSA , SAP
    • Mail : Lotus Note, Exchange, Sendmail, QMail, Postfix
    • Security and Network Device : Blue Coat System, Check Point Firewall-1, Cisco PIX, Cisco VPN, Cisco Router, TrendMicro ScanMail, Juniper Netscreen, Fortinet Fortigate

Benefits

Cost-Saving
  • No investment needed for installing extra equipments.
Customization
  • Select preferred size of data storage.
Expert service
  • 24-hour security system under expert supervision.