This resource is no longer available
Top 5 mistakes to avoid during log management implementations
In this podcast, learn about five key issues to avoid in log management implementations so you can make the most of security event logs to augment your organization’s security posture.
SpeakerJohn Burke Principal Research Analyst
John Burke is a Principal Research Analyst with Nemertes Research, where he conducts primary research, develops cost models, delivers strategic seminars, advises clients, and writes thought-leadership pieces across a wide variety of topics. John's main focus of research are cloud computing, virtualization, application delivery networking, SOA, and SaaS. His other areas of expertise are information stewardship (including information protection, information lifecycle management, business continuity planning, compliance, and data quality management) and storage technologies. As an established speaker, John has appeared at Interop, Network World IT Roadmap and TechTarget events, as well as private events for Cisco, AT&T, and others.