Available in: Jersey | Guernsey
This service logs the activity on your network and uses the data to identify cyber-threats – actual and potential. It also supports the regulatory requirement for businesses to retain user logs which can be forensically analysed.
Why you might need this service
This service gives you clear insights on who is using your network, when and for how long. You can easily compare usage to identify suspicious behaviour or anomalies on your network and maintain records to confirm with local regulatory compliance needs.
This service simplifies your security management by providing:
- 24x7x365 monitoring (via our Security Operations Centre)
- Time-synchronised logs across your multiple platforms (infrastructure, servers, endpoints, and applications)
- Scalable secure storage for the multiple terabytes of data logged each day
- A centralised repository which ensures regulatory compliance
The service also enables better risk management and decision-making, as logged data can be used in sophisticated ‘what ifs?’ to evaluate, and plan for, possible future intrusions. This means appropriate recovery plans can be designed around likely scenarios.
Log Management service by JT and ITC in partnership
We provide automated/scheduled reporting, access to security experts, and the cost certainty associated with continual, resilient management and platform support. Our managed security services have been providing visibility, control and assurance to major global brands for more than two decades. In the event of an incident JT and ITC can help you analyse these logs to help identify what has occurred.