Home
Products
LogEase SIEM Platform
LogEase LAS
Observability Platform
AIOps Platform
Log Management Platform
Resources
Customer Stories
Documentation
Videos
Ebooks
Company
About Us
Contact Us
Blog
Copilot
EN
简体中文
English
Let's Talk
PRODUCT INTRODUCTION
LogEase LAS is a centralized Log Audit System that helps small and medium business customers meet compliance mandates for log retention and strengthen security. It collects, analyzes, and stores logs from across IT environment, applying correlation rules and rich visualizations to provide real-time threat detection and comprehensive auditing, thereby simplifying security operations.
FUNCTIONAL MODULES
Home
Alert
Through the home page, users can quickly view information such as system overview, log reception status, alert overview, log and alert statistics components, etc.
Users can view system alert details through the alert page, which includes alert statistics, alert filtering, alert list (supports custom list setting).
Dashboard
Asset Management
The Dashboard displays the security situation and system status of different dimensions to users in a visual form, and users can quickly understand the situation in a specific scenario by analyzing the scenario.

The system includes built-in dashboards such as log auditing, Windows/Linux login authentication analysis, VPN log analysis, WAF analysis, and IDS analysis.

Users can also create, edit, delete, and import/export custom analysis scenarios based on their needs.
The asset management feature displays assets added manually or imported via CSV, enables real-time monitoring, and links assets to threats. This enriched asset context improves the efficiency of security analysis by providing detailed threat alert information.
Event Management
Report
In the event management feature, users can search for stored historical events using specific filter criteria.
Users can generate reports using built-in templates, including Windows/Linux host reports, daily IPS/IDS/VPN/WAF/Firewall/Middleware reports, weekly and monthly security reports, alert statistics, database reports, application security reports, and login activity analysis reports. Users can view daily, weekly, or monthly reports based on their needs to understand system status.
Rule Management
Knowledge Base
In the rule management feature, users can manage various rules in the system, including parsing rules, alert rules, and alert aggregation strategies.
Users can access security-related knowledge through the knowledge base, which supports import and export functions. It includes content such as the vulnerability database (CVE), incident response procedures, MITRE ATT&CK framework, and various attack-related information.
System Configuration
Users can perform various configurations on the system through configuration management, which is divided into two modules: configuration center and system configuration.
User Management
The user management feature allows users to configure accounts, roles, and permissions.

User Management: Users are listed with details including ID, name, email, group, last login, and creation time. Admins can manage user permissions and groups. New accounts require name, email, and password.

Role Management: Roles are listed by name and description. Admins can add, edit, assign, copy, or delete roles. Default roles include System Admin, Permission Admin, and Audit Admin, assigned to the respective users.

Role Permissions: The system defines specific permissions for each of the three default roles.
PRODUCT FEATURES
Unified Log Management
LogEase LAS collects logs from diverse systems, network/security devices in various formats. Using built-in parsing rules and a unified data model, it normalizes log data to achieve format standardization.
Centralized Log Storage
Logs are stored centrally to meet compliance requirements. Historical events can be easily reviewed in the event management module for fast incident or failure detection.
Comprehensive Analysis Scenarios
With built-in or custom analysis scenarios, LogEase LAS visualizes security posture and system status across multiple dimensions, enabling users to quickly understand specific situations.
Asset Correlation Analysis
Assets can be manually imported (e.g., via CSV) and dynamically monitored. This asset information enhances threat context in alerts and improves the efficiency of security analysis.
Event Correlation Analysis
Built-in correlation rules analyze logs from various sources (e.g., firewalls, IDS/IPS, Windows/Linux), improving the accuracy and speed of event detection and enhancing threat identification.
Flexible Reporting
LogEase LAS provides rich templates and customizable report options, allowing multi-dimensional event summaries and intuitive visibility into system operations and security status.
Knowledge Base Integration
The system includes built-in knowledge bases such as CVE, MITRE ATT&CK, and incident response procedures, supporting informed decision-making during security analysis.
Unified Log Management
LogEase LAS collects logs from diverse systems, network/security devices in various formats. Using built-in parsing rules and a unified data model, it normalizes log data to achieve format standardization.
LET'S ARRANGE A MEETING
Contact us and LogEase Support Team is here to answer it for you from Monday to Friday.
Email Support
contact@yottabyte.cn
Phone Support
+86 18611176014
WhatsApp
+86 18611176014
LEAVE US A MESSAGE
PRODUCT INTRODUCTION
LogEase LAS is a centralized Log Audit System that helps small and medium business customers meet compliance mandates for log retention and strengthen security. It collects, analyzes, and stores logs from across IT environment, applying correlation rules and rich visualizations to provide real-time threat detection and comprehensive auditing, thereby simplifying security operations.
FUNCTIONAL MODULES
Home
Through the home page, users can quickly view information such as system overview, log reception status, alert overview, log and alert statistics components, etc.
Alert
Users can view system alert details through the alert page, which includes alert statistics, alert filtering, alert list (supports custom list setting).
Dashboard
The Dashboard displays the security situation and system status of different dimensions to users in a visual form, and users can quickly understand the situation in a specific scenario by analyzing the scenario.

The system includes built-in dashboards such as log auditing, Windows/Linux login authentication analysis, VPN log analysis, WAF analysis, and IDS analysis.

Users can also create, edit, delete, and import/export custom analysis scenarios based on their needs.
Asset Management
The asset management feature displays assets added manually or imported via CSV, enables real-time monitoring, and links assets to threats. This enriched asset context improves the efficiency of security analysis by providing detailed threat alert information.
Event Management
In the event management feature, users can search for stored historical events using specific filter criteria.
Report
Users can generate reports using built-in templates, including Windows/Linux host reports, daily IPS/IDS/VPN/WAF/Firewall/Middleware reports, weekly and monthly security reports, alert statistics, database reports, application security reports, and login activity analysis reports. Users can view daily, weekly, or monthly reports based on their needs to understand system status.
Rule Management
In the rule management feature, users can manage various rules in the system, including parsing rules, alert rules, and alert aggregation strategies.
Knowledge Base
Users can access security-related knowledge through the knowledge base, which supports import and export functions. It includes content such as the vulnerability database (CVE), incident response procedures, MITRE ATT&CK framework, and various attack-related information.
System Configuration
Users can perform various configurations on the system through configuration management, which is divided into two modules: configuration center and system configuration.
User Management
The user management feature allows users to configure accounts, roles, and permissions.

User Management: Users are listed with details including ID, name, email, group, last login, and creation time. Admins can manage user permissions and groups. New accounts require name, email, and password.

Role Management: Roles are listed by name and description. Admins can add, edit, assign, copy, or delete roles. Default roles include System Admin, Permission Admin, and Audit Admin, assigned to the respective users.

Role Permissions: The system defines specific permissions for each of the three default roles.
PRODUCT FEATURES
Unified Log Management
LogEase LAS collects logs from diverse systems, network/security devices in various formats. Using built-in parsing rules and a unified data model, it normalizes log data to achieve format standardization.
Centralized Log Storage
Logs are stored centrally to meet compliance requirements. Historical events can be easily reviewed in the event management module for fast incident or failure detection.
Comprehensive Analysis Scenarios
With built-in or custom analysis scenarios, LogEase LAS visualizes security posture and system status across multiple dimensions, enabling users to quickly understand specific situations.
Asset Correlation Analysis
Assets can be manually imported (e.g., via CSV) and dynamically monitored. This asset information enhances threat context in alerts and improves the efficiency of security analysis.
Event Correlation Analysis
Built-in correlation rules analyze logs from various sources (e.g., firewalls, IDS/IPS, Windows/Linux), improving the accuracy and speed of event detection and enhancing threat identification.
Flexible Reporting
LogEase LAS provides rich templates and customizable report options, allowing multi-dimensional event summaries and intuitive visibility into system operations and security status.
Knowledge Base Integration
The system includes built-in knowledge bases such as CVE, MITRE ATT&CK, and incident response procedures, supporting informed decision-making during security analysis.
Unified Log Management
LogEase LAS collects logs from diverse systems, network/security devices in various formats. Using built-in parsing rules and a unified data model, it normalizes log data to achieve format standardization.
LET'S ARRANGE A MEETING
Contact us and LogEase Support Team is here to answer it for you from Monday to Friday.
Email Support
contact@yottabyte.cn
Phone Support
+86 18611176014
WhatsApp
+86 18611176014
LEAVE US A MESSAGE