

Log & asset management.
System administrators.

The Guarantor of Privacy with its provision of a general nature of 27/11/2008 has introduced a series of formal and technical requirements in relation to “system administrators“.
The technical requirements are basically summarized in the obligation to produce and store “access logs” to the various systems on the basis of the activities carried out by the system administrators themselves.
Your opinions


Some of our customers
The main
features.
CORA C-SIEM is modular and configurable based on the characteristics of each organization.
- ACCESS LOG AND CONSERVATION
Log historization with hashing mechanisms to ensure the inalterability of data over time and storage for a minimum of six months as required by Italian law.
- KNOW YOUR DEVICE
Quickly scan your subnets for any hardware with an IP address, including Windows and Mac computers… as well as routers, switches, printers, and more. Scheduled and on-demand scans. Detailed reports and BY analysis available.
- TRACKING OF SOFTWARE
Detect software on Windows and Mac workstations and servers. Detect and inventory cloud services. Availability of detailed reports and BY analysis.
- SYSTEM OF NOTIFICATIONS AND ALERTS
The system sends emails, SMS, push notifications or other types of alerts if anomalies are detected or when new systems / software are discovered.
- CONTINUOUS TECHNICAL MONITORING AND CONTROL
Our technicians perform a daily analytical check on the collected logs, so as to immediately intercept any anomalies and contact the customer to solve the problem.
Towards
compliance.

LEGAL LOGGER is an additional feature of CORA C-SIEM. With the entry into force of the GDPR, data protection has assumed a key role among corporate obligations.
Legal Logger allows the management and storage of system administrators’ logs in total security based on the security measures suggested in art. 32 of the New European Regulation 679/2016 GDPR.
- Centralized and secure collection, management and storage of all logs;
- Encryption of the logs;
- Powerful search engine for detailed analysis of events;
- Valuable tool to support GDPR procedures, such as systematic audit and due diligence;
- Application of the certified Infocamere time brand for the guarantee of certain date;
- Useful tool to give certainty and reliability to the test related to log files;
- Storing encrypted and timed logs in private clouds.