LOG CATCH
LOG CATCH
LOG CATCH
  • # Personal information access history management solution that searches forsensitive information in the database and accurately identifies 5W1H and stores logs collected by the system and all records accessing personal information
  • # Collection, storage, and analysis of the identified logs, automatic detection of real-time anomaly through learning, and notification to the administrator
  • # Provides explanatory materials and analysis results for personal information access in various forms of report
  • # Fully follows domestic and international compliance requests as well as the Personal Information Protection Act
Download DataSheet
  • Integrated log management and sensitive personal information access history management
  • Collects standardized personal information access log in 5W1H form
  • Detects and prevents personal information leakage through log analysis from a security perspective
  • Responds to laws and regulations related to the Personal Information Protection Act in Korea
  • Supports various WAS systems and target databases for various analysis
  • CC certification (EAL3) (scheduled), GS certification level 1

FEATURED

  • Real-time log collection via LOG CATCH Agent
  • Analyzes sensitive personal information access history in collection logs and generate various statistical information
  • Real-time risk detection and alarm occurrence based on log analysis from a security perspective
  • Detection of anomaly and management of explanation of access
    Based on 3 Sigma Rule statistics methods, identifies abnormal behaviors thorough periodic data learning and requests explanation for anomaly and manages it
  • Provides analysis information from various perspectives in real-time dashboards
  • Retrieves logs and searches for various conditions
  • Monitoring the resources (CPU, Memory, Disk) of the analysis server and the analysis target system
  • Backup and restoration of analysis log
  • Encrypts the personal information saved in the analysis log and safely stores
  • Provides administrator permission management

FEATURED +

  • Automatic and periodic detection of operating assets through scheduling
  • Detects sensitive personal information in the database and sets the collection target
  • Provides compliance reports related to personal information access records
  • Supports various operating environments
    Supports various Java-based WAS systems
    Supports DB for various log analysis
  • Synchronizes with access control solution
    Analyzes personal information access records in Chakra Max's audit log

OPERATING
ENVIRONMENT

Real-time Data Collection

SUPPORTED
SPECIFICATION

Various WAS Systems Support
JAVA-based WAS system Java 1.6 or higher (Tomcat, IBM Websphere, Oracle WebLogic, Tmax jeus)
Various collection target DB support
Oracle Microsoft SQL Server IBM DB2 Sybase ASE/IQ MySQL MariaDB PostgreSQL Tibero Altibase PetaSQL
Various DBMS support
Oracle Microsoft SQL Server IBM DB2 Sybase ASE/IQ MySQL MariaDB PostgreSQL Amazon Aurora Amazon RedShift Altibase Tibero Cubrid