This post is also available in:
Vietnamese
Detect & Identify
Threat detection in the IT network is the practice of analysing the entirety of a security ecosystem to identify any malicious activity that could compromise the network.
If a threat is detected, then mitigation efforts must be
enacted to properly neutralise the threat before it can exploit any present vulnerabilities.


Collect, filter, transform, enrich and deliver logs for audit or cyber threat detection
syslog-ng is the most widely adopted log management software globally. It is designed for maximum efficiency and
flexibility with the ability to handle enterprise loads and route to multiple destinations even on a single instance.
Added to that is the ability to ensure minimal log loss with Advance Log Transport Protocol, disk-buffering and flow
control as well as full log encryption in transit as well as at rest, there is simply no better alternative for the
enterprise.
Featured products:
syslog-ng Premium Edition
syslog-ng Store Box (SSB)

Axoflow was founded by veterans of cybersecurity and observability, led by CEO Balázs Scheidler—creator of syslog-ng, a pioneering pipeline solution used by Fortune 500 since 1998. His fellow founders come from the cloud-native Logging Operator project—a pipeline for enterprise K8s telemetry data. After witnessing how traditional SIEMs became prohibitively expensive while failing to improve security, they set out to reimagine how security data is collected, curated, and used—recognizing that data is one of the keys to solving the puzzle.
Their automated data pipeline focuses on data quality, delivering detection-ready insights, without having to write or maintain another config. By merging deep on-prem logging expertise with modern cloud-native practices, Axoflow empowers teams to drive real cyber outcomes at a fraction of the cost.
Featured products:
Security Data Curation

Industry-leading log management and SIEM
Graylog is an open-source log management platform that provides log aggregation, analysis, audit, display, and early warning tools. It is similar to ELK in terms of function but is much simpler and lighter than ELK. Graylog is on a mission to make Log Management and SIEM easier, faster, more affordable, and more effective. It is purpose-built by practitioners with the practitioner in mind. Graylog has focused on log management right from the beginning.
Featured products:
Graylog Security
Graylog Operations

Netflow Logic transforms raw network traffic data into actionable insights, enhancing visibility into network performance and security. As a leading solution for network traffic monitoring and analysis, Netflow Logic simplifies the process of identifying and resolving network issues, ensuring optimal performance and security across your infrastructure. Its integration with SIEM platforms provides a holistic view of network activity, empowering organizations to detect anomalies, monitor bandwidth usage, and safeguard against potential threats. Netflow Logic’s scalable architecture makes it ideal for networks of all sizes, from small businesses to large enterprises.
Featured products:
NetFlow Optimizer
About Us
From hardware appliances to software solutions and training, DT Asia understands cybersecurity challenges and can deliver solutions that help detect & identify, protect & secure, authenticate & authorise, and degauss & destroy.
Contact Us
Address
#02-72 WCEGA Tower,
Singapore 658065