sponsored by Novell, Inc.
Posted:  07 Mar 2011
Published:  07 Mar 2011
Format:  PDF
Length:  18  Page(s)
Type:  White Paper
Language:  English
ABSTRACT:

Security information and event management (SIEM) technology has existed since the late 1990s, but it has always been somewhat controversial in the security industry due to its initial promise of a “security single pane of glass” combined with slow adoption across smaller organizations. More recently, traditional SIEM has been joined by a broad use log management technology that focuses on collecting a wide variety of logs for a multitude of purposes, from security incident response to regulatory compliance, system management and application troubleshooting.

In this paper we will analyze the relationship between these two technologies - SIEM and log management - focusing not only on the technical differences and different uses for these technologies, but also on architecting their joint deployments.






BROWSE RELATED RESOURCES
Intrusion Detection Systems | Log Management | Payment Card Industry Data Security Standard Compliance | Regulatory Compliance | Reporting Software | Security Event Management | Security Management | Security Threats

View All Resources sponsored by Novell, Inc.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement