Categories
Problems that solves
Unauthorized access to corporate IT systems and data
Risk or Leaks of confidential information
High costs
Risk of data loss or damage
Risk of lost access to data and IT systems
No monitoring of corporate IT processes
Values
Reduce Costs
Ensure Security and Business Continuity
Enhance Staff Productivity
IT@Work ProLog
ProLog is used as a log management solution for clients in the areas of small and medium-sized enterprises, finance and insurance, energy and water supply, health, welfare and church, and so on.
About Product
Description
In addition to the firewall and a backup/restore system, log management is the third pillar of IT and data security. Numerous customers with critical infrastructures rely on the German log management solution IT@Work ProLog for this topic. With ProLog, you get a tool that meets the legal requirements that apply precisely to your business. As a service provider for IT security, we do not just sell you software. Instead, we work with you to develop an audit-proof design with the requirements that will be covered later by the solution. We take over the complicated part of the job and make sure that you end up with a system of alerts and reports in which every lawyer, auditor, and an auditor will make a happy face.
ProLog is used as a log management solution for clients in the areas of small and medium-sized enterprises, finance and insurance, energy and water supply, health, welfare and church, public institutions (municipalities, federal states, and federal government), chambers and associations, automotive suppliers and many more and thus already builds on the requirements and know-how that are covered for all other customers. With every new customer, the safety standard is raised for everyone. IT@Work ProLog was awarded in 2018 by the Initiative Mittelstand with the INNOVATIONSPREIS-IT for "particularly innovative IT solutions with high SME benefits". The solution also takes into account all the requirements of the General Data Protection Regulation.
Competitive products
User features
Roles of Interested Employees
Chief Executive Officer
Chief Information Officer
Chief IT Security Officer
IT Security and Risk Management
Organizational Features
IT Security Department in company
Internet access is available for employees