It stores traffic-data logs for 90 days and manage them in line with the requirement laid down by the Computer Crime Act of BE 2550. There is also no limit on the number of log sources.
- Daily report on traffic-data logs
- Encrypted files during log transfers
- One set of backup logs at UIH’s disaster recovery site, which meets international standard
- Monitoring of log transfers with relevant officials being alerted if traffic-data logs do not reach the storage centerwithin four hours since their generation
- Indexing services are available, thus enabling quick & efficient Google-Like searches
- Lower cost in regards to equipment purchases and implementations
- Flexibility in handling unpredictable volumes of traffic-data logs
- Compliance with the Computer Crime Act of BE2550
- Log management by experienced experts & a lower cost in regards to staff
- More storage space as customers will maintain mainly log files
- Consultation services over the phone or via emailsduring workhours (8 hours a day, five workdays a week)
- Daily report on traffic-data logs
- Encrypted files during log transfers
- One set of backup logs at UIH’s disaster recovery site, which meets international standard
- Monitoring of log transfers with relevant officials being alerted if traffic-data logs do not reach the storage centerwithin four hours since their generation
- Indexing services are available, thus enabling quick & efficient Google-Like searches
- Lower cost in regards to equipment purchases and implementations
- Flexibility in handling unpredictable volumes of traffic-data logs
- Compliance with the Computer Crime Act of BE2550
- Log management by experienced experts & a lower cost in regards to staff
- More storage space as customers will maintain mainly log files
- Consultation services over the phone or via emailsduring workhours (8 hours a day, five workdays a week)