Do your network device logs proviode sufficient detail to support incident investigations?

book reader icon
1 Minute
facebook logo gray
linkedin logo gray
mail logo gray

Yes. Next to comprehensive Audit Trail Logs, our network device logs are sufficiently detailed to support incident investigations.

In accordance with all relevant internal Policies, compliance requirements and common best practices, all logs are retained for as long and in such detail as indicated, and can be used in forensic analysis if necessary.

Last update 1 week ago