Searching simple condition
Multiple searching
General rule
Detect IP/Port/attack name/specific letter array based
attacks in a real-time basis.
Allocation rule
Analyze and detect abnormal data collected
for certain period of time.
Correlation rule
Detect abnormal data based on
the correlations of time and event.
PROM SIEM can manage all types of IT assets upon establishing the security system optimized
for the customers and detect abnormal data based on availability.
Dashboard of PROM SIEM can show the monitoring of essential information and current traffic.
Overall threatening level can be checked by detection of abnormal data.