IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Log Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Event Log Monitoring
DEFINITION: The collection, storage, and reporting of log data from firewalls, routers, servers, applications, operating systems and devices in near real-time for compliance and risk mitigation.
Log Management White Papers (View All Report Types)
1 - 25 of 61 Matches Previous Page  |  Next Page
A Comprehensive Security Intelligence Platform
sponsored by IBM
WHITE PAPER: Download this paper to discover the pros and cons of an SIEM platform and to determine if this is the one that meets your needs.
Posted: 23 Mar 2015 | Published: 30 Sep 2014

IBM

Understand the Correlation Between Developers and Operations
sponsored by AppDynamics
WHITE PAPER: This white paper examines the story behind DevOps: how exactly it works and combination of power between developers and operations.
Posted: 04 Mar 2015 | Published: 31 Dec 2014

AppDynamics

Global Threat Intelligence Report
sponsored by Dimension Data
WHITE PAPER: This in-depth white paper can help you discover the latest security threats and how to stop them.
Posted: 26 Feb 2015 | Published: 31 Dec 2014

Dimension Data

Staying Compliant for On-the-Fly Investigations
sponsored by Dell Software
WHITE PAPER: Access this white paper and learn how to make sense of all of your data and remain compliant for on-the-fly investigations.
Posted: 23 Feb 2015 | Published: 04 Dec 2014

Dell Software

Ratings and Rankings for Security Forensics Tools
sponsored by IBM
WHITE PAPER: The following report reviews and rates seven security analytics programs, revealing which tools have been proven to reduce false positives and detect threats quickly and accurately.
Posted: 05 Feb 2015 | Published: 01 Jul 2014

IBM

10 Vendors Dominating the APM Market—How Do They Stack Up Against One Another?
sponsored by IBM
WHITE PAPER: This resource explores 10 of the leading APM solutions in the market today, and thoroughly evaluates and compares them to one another.
Posted: 08 Dec 2014 | Published: 18 Feb 2014

IBM

How Do Top SIEM Products Compare in Common Client Deployment Scenarios?
sponsored by IBM
WHITE PAPER: This resource from Gartner evaluates vendors' SIEM products and services based on their ability to fulfill users' requirements in the areas of compliance, threat management, and SIEM, helping organizations to select the solution that best fits their particular needs.
Posted: 27 Aug 2014 | Published: 25 Jun 2014

IBM

Top 5 Truths About Big Data Hype and Security Intelligence
sponsored by Hewlett-Packard Company
WHITE PAPER: This resource outlines the top five truths behind the Big Data hype and explains why Big Data Security Analytics (BDSA) is the future of security intelligence. Read on to learn how it offers the insight you need to perform real-time threat detection and defense.
Posted: 19 Aug 2014 | Published: 05 Sep 2013

Hewlett-Packard Company

Big Security for Big Data
sponsored by Hewlett-Packard Company
WHITE PAPER: This resource details how to make security event management simple, intelligent, efficient, and manageable, despite the issues big data creates. View now to learn more!
Posted: 19 Aug 2014 | Published: 31 Dec 2012

Hewlett-Packard Company

Transitioning from Log Management and SIEM to Comprehensive Security Intelligence
sponsored by IBM
WHITE PAPER: This white paper discusses how security intelligence addresses these shortcomings and empowers organizations—from Fortune Five companies to midsize enterprises to government agencies— to maintain comprehensive and cost-effective information security. It will show how security intelligence addresses critical concerns in five key areas.
Posted: 31 Jul 2014 | Published: 31 Jan 2013

IBM

Introducing LogRhythm v6.2
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper describes LogRhythm vg.2, which offers security professionals a powerful monitoring and auditing platform to keep them informed, and excellent investigatory tool in case things go wrong.
Posted: 29 Jul 2014 | Published: 30 Apr 2014

LogRhythm, Inc.

How to Stay Compliant with PCI DSS Standards
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper explores a solution that has plenty of experience in helping organizations improve their overall security and compliance standings while reducing costs.
Posted: 29 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

Better Security Intelligence for Financial Enterprises
sponsored by IBM
WHITE PAPER: In this resource, discover why financial institutions should consolidate existing security tools for a more robust fraud prevention and data protection system, alongside compliance with regulation mandates.
Posted: 26 Mar 2014 | Published: 31 Mar 2013

IBM

How to Protect the Increasingly Vulnerable Energy Industry
sponsored by IBM
WHITE PAPER: Learn how an integrated security intelligence platform provides the necessary components to help energy and utilities companies automate compliance and risk management, detect and manage threats, and protect the smart grid from both security breaches and cyber-attacks.
Posted: 24 Mar 2014 | Published: 31 Jul 2013

IBM

Leverage Security Intelligence for Government Agencies
sponsored by IBM
WHITE PAPER: This resource features a security intelligence platform that's paired with data analytics to help prevent, defend, remediate, and analyze more security incidents and policy violations than traditional information security systems.
Posted: 05 Mar 2014 | Published: 31 Mar 2013

IBM

Better Security Intelligence for the Finance Industry
sponsored by IBM
WHITE PAPER: A security intelligence platform is a key element for fighting the many threats the financial institution faces, and this white papers describes on such platform.
Posted: 19 Dec 2013 | Published: 31 Mar 2013

IBM

Enhance Security Intelligence for Your Energy or Utilities Company
sponsored by IBM
WHITE PAPER: In this white paper, learn about a comprehensive security intelligence platform designed especially for the needs of energy and utilities companies.
Posted: 21 Aug 2013 | Published: 31 Jul 2013

IBM

Steps for Tighter Security and Easier Compliance with Log Management
sponsored by IBM
WHITE PAPER: Explore how replacing your legacy, siloed log management systems with an integrated approach is crucial to reducing security risks and improving compliance across your diverse IT environments.
Posted: 21 Aug 2013 | Published: 31 May 2013

IBM

QRadar Risk Manager: Security Intelligence Keeps You Ahead of Threats
sponsored by IBM
WHITE PAPER: This white paper highlights an automated risk management solution that correlates information on asset vulnerabilities and device configurations to better predict risks before they occur.
Posted: 17 Dec 2013 | Published: 31 Jan 2013

IBM

Automated Log Management for Hybrid Cloud Environments
sponsored by VMware, Inc.
WHITE PAPER: In this white paper, discover a log management tool that addresses the needs of today's dynamic environment by providing quality of service, operational efficiency, and compliance features for optimum infrastructure and application service levels.
Posted: 18 Oct 2013 | Published: 13 May 2013

VMware, Inc.

How To: Creating Content Packs
sponsored by VMware, Inc.
WHITE PAPER: In this detailed white paper, explore content packs, the information they store, and best practices for content pack creation within Log Insight 1.0.
Posted: 18 Oct 2013 | Published: 31 Aug 2013

VMware, Inc.

Unclutter Your Data Center With Consolidated Log Management
sponsored by VMware, Inc.
WHITE PAPER: In this white paper, explore a consolidated logging system to avoid the risks that may occur in a complex IT environment, and feel confident in running a reliable and secure virtual data center.
Posted: 17 Oct 2013 | Published: 13 Jun 2013

VMware, Inc.

Log Analytics: Simplifying Complex IT Environments
sponsored by VMware, Inc.
WHITE PAPER: Access this white paper for interviews with IT operations teams looking for better ways to effectively collect, analyze, and harness key information from logs in today's complex IT environment.
Posted: 17 Oct 2013 | Published: 17 Oct 2013

VMware, Inc.

Proactive data security, audit and compliance solutions
sponsored by IBM
WHITE PAPER: Access this white paper for key information about a data management solution that supports enterprises in their entirety, and ensures automated, integrated compliance and security across all platforms.
Posted: 16 Oct 2013 | Published: 30 Apr 2013

IBM

Automated Log Analytics Critical For Security and Compliance Management
sponsored by VMware, Inc.
WHITE PAPER: Access this resource to uncover a new category of log analytics tools to accommodate the trend in virtual and cloud infrastructures for efficient troubleshooting, security, and compliance management.
Posted: 15 Oct 2013 | Published: 01 Jun 2013

VMware, Inc.
1 - 25 of 61 Matches Previous Page    1 2 3    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement