Log Management

ProLog®: pass the next IT audit with confidence

The proven log management solution

Protect your systems from loss and misuse of personal data and confidential business information. Respond to incidents in real time. Meet regulatory requirements for proper logging of access and changes.

This is how it works!

1. documentation as preparation for your log management

Record all security-relevant necessities and definitions. The documentation communicates clearly and comprehensibly from which data sources events and logs are retrieved, what types of (personal) data are collected, why this data is logged, and how access to this data is structured. This allows you to demonstrate to attorneys, association auditors, internal or external auditors, and state data protection authorities that you have implemented the topic.

With our logging concept, you receive a template that you only need to fill out. We will be happy to support you!

2. reporting and alerting packages for your log management

We provide you with ready-made reporting packages and alerts that enable you to comply with both external regulations (e.g. DSGVO) and internal corporate compliance in your business. With us, you no longer run the risk of having to reconfigure your entire log management after an application or operating system update, because we keep your reporting and alerting packages up to date as part of our maintenance. If changes are required due to external regulations or internal compliance, we will implement them together with you and any sales partners so that your log management remains audit- and revision-proof.

3. Further advantages of the ProLog® Log Management Software

  • completely developed and maintained in Germany
  • completely implemented in C/C++, no use of frameworks from foreign powers
  • complete data collection by local agents on the monitored systems with store & forward capability in case of connection interruption to the central system
  • pseudonymized storage of all information that allows conclusions to be drawn about the persons concerned
  • Depseudonymization only via authorization by n-eyes principle
  • Guaranteed data integrity
  • Preconfigured reporting and alerting packages provide usable information from the time of installation and ensure that the reporting and alerting system continues to function without significant reconfiguration efforts, even when switching to new operating system versions.

ProLog® to meet legal requirements

IT Security Act (ITSiG)
General Data Protection Regulation (DSGVO)
ISO 27001 /27002
VDA Information Security Assessment (VDA-ISA)
Business Secrets Act (GeschGehG)
IT Security Act (ITSiG)

According to §8a of the IT Security Act, operators of critical infrastructures have been obligated since July 18, 2017 to "take appropriate organizational and technical precautions to prevent disruptions to the availability, integrity, authenticity and confidentiality of their information technology systems [...]." You can comply with this regulation with ProLog®.

General Data Protection Regulation (DSGVO)

The General Data Protection Regulation aims to protect the fundamental rights and freedoms of natural persons and their personal data. The GDPR was adopted on April 27, 2016 and is applicable in all EU member states since May 25, 2018. With ProLog® you work DSGVO compliant.

ISO 27001 /27002

The ISO 27001 & 27002 standards specify requirements for establishing an information security management system (ISMS) with consideration of processes, people and technologies in an organization. Implementation of the standards helps protect and manage information through risk management. An ISMS based on the ISO 27001 standard meets requirements for IT security or data protection. The ISO 27002 standard provides guidelines for implementation and can be used as an aid to meet an audit review for ISO 27001 certification. ProLog® works on the basis of ISO 27001.

VDA Information Security Assessment (VDA-ISA)

In 2005, the German Association of the Automotive Industry developed a catalog of questions on information security that is used in the industry as a basis for auditing internal and external information security. The VDA-ISA is based on the international standards ISO 27001 and 27002 and is generally checked using the TISAX testing and exchange mechanism.

Business Secrets Act (GeschGehG)

On March 21, 2019, the German Bundestag passed the Trade Secrets Act. It deals with the protection of confidential know-how and confidential business information against illegal acquisition as well as illegal use and disclosure. With ProLog® you install an important building block to protect your trade secrets.

Call-back service

Immediate information and the right contact.

Your goals: Capture and evaluate log data

  • fast, legally compliant & audit-proof
  • immediately usable, update-safe
  • centrally administrable
  • real-time alerts

Your solution: ProLog®

  • Pseudonomization
  • n-eye requests
  • granular role concepts
  • Documentation
  • alerting & reports

Ensure that all critical applications are always available and running fast - for satisfied end users