Alog logo

By  amiya

Server, database and device Access Log management.

Economy of Scale efficiently handles the storage of Access Logs with significantly higher volumes than usual. Proven by maintaining the No.1 market share in Japan for 17 consecutive years, with a remarkable 70% market share — currently reaching as high as 86%.

In addition, it has been granted a patent (Patent No. 6501159) for its Access Log management technology, which reduces the original log data size by up to 1/200. The system also translates log data into a user-friendly format, making it easier for users to analyze and utilize the information effectively.

This solution supports long-term storage of Access Logs, offering clear cost savings. With these capabilities, it has become a trusted Access Log solution adopted by many countries worldwide under the AMIYA brand.

image_alog_badge Eng

⭐ No.1 Server Access Log Market
⭐ Number of Contract > 6,000
⭐ Market Share Over 70%
⭐ Persistence Rate 86.4%

Exhibitor : Deloitte Tohmatsu MIC Research Institute.
[Current status and future prospects of the
internal fraud prevention solution market 2022]
Published in January 2023
URL : https://mic-r.co.jp/mr/02620/

Simplified SIEM, Make Log Management Easier

Automated Access Log Management for Simpler, User-Friendly Security
Access logs are automatically managed to provide a simpler and more user-friendly approach to security for everyone.

Log usage is billed based on the data size after translation and compression, allowing for significantly reduced costs. This makes the system highly cost-effective and reliable—even for environments with high log volumes.

Benefits reporting on organizational data usage is critically important, especially in cases where auditing is required. It demonstrates how data is accessed and utilized, while also supporting compliance with regulations, policies, and data security requirements.

Auditable and reportable forms of data access include:

  • Access via File Sharing systems, both direct and indirect

  • Use of database tools such as SSMS or SQL*Plus

  • Accessing files or databases through application software or utility software

  • Automated system access, including machine access and RPA (Robotic Process Automation)

  • Access through APIs, and more

Having a comprehensive reporting system allows organizations to control, monitor, and audit data usage effectively. It ensures readiness for compliance with various regulations and legal requirements with confidence.

Alog Easy to see
Alog Correctly
Alog Small

Patented No.6501159

Patented translation technology
that pursues ease of understanding

Logs are often large, unreadable, and require specialized skills and effort to analyze.
Understanding what and when happened can be challenging.

However, by organizing and presenting logs in a clear and easy-to-understand manner, you can significantly improve your ability to respond quickly and effectively when issues arise.

Complex and difficult log data is transformed into easy-to-understand information using our unique translation and conversion technology.
It converts raw logs into clear content that shows what and when happened—making it accessible to anyone.

With purpose-specific report and alert templates, you can start using the logs immediately for monitoring, analysis, or incident response.

Cost-effective

Affordable, optimizing cost and make it easy to get started

ALog charges based on the amount of log data collected.
Licensing is usage-based, allowing for scalable log collection without needing to be aware of specific monitoring targets.
This approach enables significant cost savings, even in large-scale environments.

other product

Alog Price
Alog logo
Alog Cost
alog automation
Alog automation

No need hiring expert, easy operation
with AI and automation technology

Easily and automatically collect logs from on-premises to the cloud.
Cloud service API specifications are kept up to date with changes, ensuring smooth and hassle-free operation.

Security alerts and reports can be set up effortlessly using built-in templates.
In case of an emergency, notifications can be sent automatically via email, webhook, or integrated with external systems.

AI-powered risk scoring automatically analyzes data patterns.
Any deviation from normal behavior is scored and flagged as a potential sign of unauthorized access or cyberattack.

Unlocking Secure Simplicity: Effortless Microsoft 365 Log Management with ALog

As many organizations migrate to Microsoft 365 to support remote work, a major challenge emerges: managing and storing usage logs, which can be complex and costly if relying on Microsoft’s high-tier licenses for long-term retention.

ALog was developed as a simpler and more affordable alternative. This Japanese solution enables easy collection, analysis, and risk detection of logs from Microsoft 365 services like OneDrive, SharePoint, and Exchange—without requiring specialized expertise. The system includes AI that learns user behavior patterns and automatically flags suspicious activities, helping prevent both internal and external data leaks.

With its intuitive interface, fast search capability, and log compression to save storage space, ALog is ideal for organizations seeking high-level security while reducing operational costs and complexity in log management.

Stop Insider Threats Before They Start: How ALog Makes Internal Fraud Visible

Data leaks in organizations are not caused only by hackers. Very often, they originate from insiders who either act deliberately or neglect proper procedures, leading to serious damage. For example, former employees may take sensitive information to use at a competing company, or someone might accidentally send critical files to the wrong recipient. As remote work becomes more widespread, it has become even harder to monitor employee behavior effectively.

ALog was designed to prevent internal fraud in a simple and accessible way. The system can collect logs of file access and user activities from both Microsoft 365 and internal environments without requiring technical expertise. ALog’s AI analyzes historical behavior patterns and compares them against normal usage to detect suspicious signs that humans might overlook, such as accessing files outside working hours, downloading large volumes of data, or sharing confidential information externally.

Uncover Hidden Cyber Attacks: How ALog SIEM Simplifies Threat Detection

As remote work expands, cyber-attacks like phishing and ransomware have become harder to detect with traditional security tools alone. ALog offers an integrated SIEM solution that automatically collects and analyzes logs from servers, networks, and Microsoft 365.

Its AI learns normal behavior patterns and flags suspicious activities—such as repeated failed logins or unauthorized data transfers—so threats are detected early. With easy setup and automated alerts, ALog helps organizations protect critical data without the complexity of conventional SIEM products.

WHITE PAPER

Information on the threats to the safety of the public, and the importance of the threats to the safety of the public.

From the basics of [why not notice cyber attacks] to [creating a concrete mechanism for automatic detection]. Introducing efficient cyber security measures from the perspective of log management

Introducing a method to automatically manage “security measures for cloud services” using Microsoft 365 as an example.

DOWNLOAD

How to utilize logs as an asset

“Storing” and “utilizing” logs are completely different things. In this
document, we will introduce three typical pitfalls that can cause “log
oversights” and provide examples of how to use ALog to provide truly
useful log operations.

Sales Manager

Kritsakorn Kucharoenpaisan

Telephone

+66 (0)87-516-3403

email

sales.cybersec@magicsoftware.co.th