
DatalaiQ
Protect your company with a product data lake developed in Japan.
It integrates structured and unstructured data for high-speed search, analysis, and visualization, supporting data-driven decision-making from security incident detection to response.
.png)
Visualize structured and unstructured data for the fastest detection and response.
Regardless of the type of business or industry, we collect both standard and non-standard "machine data," including non-binary data, from existing systems (core systems, servers, firewalls, etc.), and perform high-speed searches, correlation analysis, and visualization of the vast amount of accumulated data to detect, identify, and respond to security incidents more quickly.
.png)

Data Intelligence Platform for Japanese Companies

Data Intelligence Platform for Japanese Companies
This solution centralizes scattered corporate data and builds a data lake optimized for security analytics, efficiently processing data in all formats, from structured data to unstructured logs.

System logs and audit logs
Network Device Logs
Security Tool Alerts
Application Data
IoT and industrial control system data
High-speed search and analysis engine

Implement automation and advanced workflows
Build workflows between indexed or extracted fields and other data points to enable automated actions. Workflow actions are widely applicable to a variety of applications. Define and build custom workflow actions to accelerate your analysis.


DatalaiQ Case Study
Kyushu Institute of Technology Kyutech CSIRT
Improving security operations efficiency at large educational institutions

Kyushu Institute of Technology uses DataIaiQ to efficiently analyze and manage an average of 200GB of communication logs generated daily from over 10,000 devices used by 6,000 faculty, staff, and students. With a limited staff of 12, the institute is able to manage 60TB of log data, ensuring both a rapid response to incidents and compliance with legal requirements.
Kyushu Institute of Technology, National University Corporation
Professor, Deputy Director of Information Infrastructure Center, Information Management Headquarters Director of Network Security Infrastructure Operations Office (Deputy CISO) Director of DX Promotion Office / Kyutech CSIRT Leader Ph.D. (Engineering)
Mr. Yutaka Nakamura
Implementation process: From PoC to full-scale operation
The estimated implementation time is approximately 1-2 months, starting with a consultation, connecting to the POC environment, and going through an evaluation period before final completion.
License issuance
.png)
training
.png)
construction

Evaluation period

