There are times when your organization will need to take a more forensic look at logs.

Investigator is available as a value-added service for Security Log Monitoring and Log Management clients. Accessible through the NTT Security portal, Investigator provides cloud-based, real-time access to raw data logs.

As we collect and analyze logs, we also archive a copy of the raw logs in a secure, cloud-based and forensically-sound repository. This enables log data mining for efficient security and compliance incident investigations, with search results filtered and mass exported for further analysis.


You Are Here


3.2.x Managed Security pillar image

Managed Security Service Categories


SecureCall provides a single point of contact across multiple security technologies to efficiently resolve complex technical issues and maximize a client’s return on technology investment.

Learn More
Vulnerability Management

Start seeing a measurable improvement in vulnerability reduction using our Global Managed Security Service Platform (GMSSP), threat intelligence, and exploit tracking to focus your vulnerability management efforts on the highest impact vulnerabilities in your ICT environment.

Learn More
Security Device Management

Correctly configured, managed, and maintained devices are essential to protecting your organization’s assets and are a compliance requirement for regulations including PCI DSS, GLBA, HIPAA, and SOX

Learn More
Enterprise Security Monitoring

Comprehensive log monitoring is a critical component of your security program and a requirement for regulations such as PCI DSS, GLBA, HIPAA, SOX, and others. Logs require extended analysis 24 hours a day, seven days a week.

Learn More
Enterprise Security Program Services

Beyond traditional MSS, ESPS services enable clients to mature their security program. Our dedicated team of security professionals will take responsibility for strategic planning, architecture, implementation, advanced analytics, reporting, and overall security program guidance.

Learn More