Data analysis services

IT infrastructure audit

Man looking at a computeur screen containing histograms

Whether as part of an annual IT infrastructure audit or for a specific need to assess the state of your IT ecosystem, we conduct in-depth analyses of logs from all the equipment that structures your computer system.

These analyses allow:

  • To establish an uncompromising list of imperceptible malfunctions that have a strong potential for disruption (such as security or performance problems).
  • To anticipate the future consequences of these malfunctions.
  • To define a comprehensive remediation and consolidation action plan.

We have the capacity to process a large volume of logs and analyze the operation of equipment and technologies such as:

  • Proxies
  • Routers
  • Firewalls and WAF
  • DNS
  • DHCP
  • Web servers (Apache, NGINX)
  • SSH bastions
  • VPN servers
  • Antivirus servers

IT Troubleshooting

Network engineer looking at a laptop in a server room

Have you identified an issue in your IT infrastructure but are unable to pinpoint its origin?

Thanks to the software's ability to highlight weak signals, finding the needle in the haystack becomes possible!

By also being capable of analyzing and correlating logs from various types of equipment, we approach your problem holistically to gain the most comprehensive insight into your system.

By consolidating this disparate information, we can provide you with a coherent overview, facilitating the swift identification of potential point of failure and the targeted implementation of solutions.

With this approach, addressing issues and optimizing the performance of your network becomes an effective and informed process.

Structured data

Data scientist analysing data on a laptop

Do you have structured data that you collect without knowing if you can truly leverage them?

Or perhaps you are already utilizing this data but are not entirely certain about what they actually contain?

Don't stay in doubt: regardless of the volume of your data, we can analyze them through interactive and comprehensive visual exploration.

We'll never share your email with anyone else.                                       

FAQ

The analysis presentation is conducted through a video session, during which we will present the following deliverables:
  1. The analysis report in PDF format.
  2. Files generated by the Squey software:
    • Data parsing files (.format) to empower you for independent analysis of similar data (see our trainings offer).
    • Investigation files (.pvi) containing the data layers utilized during the analysis.
  3. Any pertinent data exports for utilization with other tools (compressed CSV format).

An analysis of a non-trivial network or data volumetrics can take anywhere from one to five days, depending on the desired level of depth and comprehensiveness. Our analysts will guide you during the quotation process based on your specific objectives.

Our analysis supports a variety of data formats, including Databases (MySQL/MariaDB, PostgreSQL, SQLite, and Elasticsearch), PCAP, CSV, and single-line structured text files.

In addition to a formal non-disclosure agreement, data transfer is secured through the SSL/TLS standard and storage is using AES-512 encryption. For clients utilizing AWS cloud services, data analysis can be conducted securely from within your Virtual Private Cloud (VPC).