A Computer Weekly buyer's guide to log management
Log management originates from a time when storage was limited and expensive. The aim was to preserve logs generated by a range IT devices and store them centrally for future scrutiny. As storage became cheaper, more logs could be kept, and it now provides insight into IT system behaviour and offers the opportunity to turn machine data into operational intelligence. In this 13-page buyer’s guide, Computer Weekly looks at how companies analyse server and security logs to tackle cybercrime and internal fraud; how application log management provides insight into application behaviour, which can be used to build better software; and how network administrators can use data from log files to automate security systems.