IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Log Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Event Log Monitoring
DEFINITION: The collection, storage, and reporting of log data from firewalls, routers, servers, applications, operating systems and devices in near real-time for compliance and risk mitigation.
Log Management White Papers (View All Report Types)
1 - 25 of 58 Matches Previous Page  |  Next Page
Getting Started with Container Monitoring
sponsored by Splunk
WHITE PAPER: Containers may add complexity to your infrastructure, but it doesn't have to add complexity to your job. Get started with this guide to container monitoring and start taking advantage of better code to deliver the best experience to end users.
Posted: 15 Jun 2016 | Published: 15 Jun 2016

Splunk

What’s New in the Windows 10 Security Log
sponsored by LogRhythm, Inc.
WHITE PAPER: In this white paper, take a look at the new and updated event entries in Windows 10 and learn how to leverage them to identify malicious activity. Continue reading to uncover the specific auditing and logging events recently added by Microsoft and how to turn data into insights.
Posted: 07 Mar 2016 | Published: 27 Jan 2016

LogRhythm, Inc.

Combating the Insider Threat: Your Guide to Staying Secure
sponsored by Cisco Systems, Inc.
WHITE PAPER: This resource explores the danger of insider threats and provides suggestions on preventing them. Read on to learn why you need to focus your security inward and what practices will help you do so.
Posted: 05 Jan 2016 | Published: 31 Dec 2015

Cisco Systems, Inc.

Critical Capabilities Use Cases for Security Information and Event Management
sponsored by LogRhythm, Inc.
WHITE PAPER: This vendor comparison reviews SIEM performance by three different use cases, showing you which SIEM platform works best for your business needs.
Posted: 27 Oct 2015 | Published: 21 Sep 2015

LogRhythm, Inc.

Indicators of Compromise
sponsored by IBM
WHITE PAPER: This white paper presents indicators of compromise to look out for and outlines a four-step process for remediating these compromises.
Posted: 08 Sep 2015 | Published: 30 Jun 2015

IBM

Global Threat Intelligence Report
sponsored by Dimension Data
WHITE PAPER: This in-depth white paper can help you discover the latest security threats and how to stop them.
Posted: 26 Feb 2015 | Published: 31 Dec 2014

Dimension Data

Making Sense of Your IT Data for On-the-Fly Investigations
sponsored by Dell Software
WHITE PAPER: This white paper examines the difficulties of constant audit preparedness and gives suggestions on how to keep your organization compliant. Read on to learn how you can improve your log management, data analytics, and more for constant audit readiness.
Posted: 23 Feb 2015 | Published: 04 Dec 2014

Dell Software

Transitioning from Log Management and SIEM to Comprehensive Security Intelligence
sponsored by IBM
WHITE PAPER: This white paper discusses how security intelligence addresses these shortcomings and empowers organizations—from Fortune Five companies to midsize enterprises to government agencies— to maintain comprehensive and cost-effective information security. It will show how security intelligence addresses critical concerns in five key areas.
Posted: 31 Jul 2014 | Published: 31 Jan 2013

IBM

Introducing LogRhythm v6.2
sponsored by LogRhythm, Inc.
WHITE PAPER: Uncover a review of a security intelligence tool that offers a powerful monitoring and auditing platform to keep you informed, and an investigatory tool in case things go wrong. Discover its strengths, weaknesses, and more.
Posted: 29 Jul 2014 | Published: 30 Apr 2014

LogRhythm, Inc.

How to Stay Compliant with PCI DSS Standards
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper explains how to ensure you meet the 6 standards of PCI compliance with reporting enabled by automatic log data categorization, identification, and normalization. Access this white paper to discover 12 guiding principles for compliance.
Posted: 29 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

Research Report: The Benefits of Security Analytics
sponsored by Prelert
WHITE PAPER: Read this report to discover what IT pros have to say about security analytics' most useful features, its value, and more.
Posted: 05 May 2015 | Published: 30 Apr 2015

Prelert

Extending Security Intelligence with Big Data
sponsored by IBM
WHITE PAPER: Learn how IBM Security Intelligence with Big Data can help organizations gain insights into advanced data threats.
Posted: 08 Oct 2014 | Published: 31 Jan 2013

IBM

Top 5 Truths About Big Data Hype and Security Intelligence
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This resource outlines the top five truths behind the Big Data hype and explains why Big Data Security Analytics (BDSA) is the future of security intelligence. Read on to learn how it offers the insight you need to perform real-time threat detection and defense.
Posted: 19 Aug 2014 | Published: 05 Sep 2013

Hewlett Packard Enterprise

How to Protect the Increasingly Vulnerable Energy Industry
sponsored by IBM
WHITE PAPER: Learn how an integrated security intelligence platform provides the necessary components to help energy and utilities companies automate compliance and risk management, detect and manage threats, and protect the smart grid from both security breaches and cyber-attacks.
Posted: 24 Mar 2014 | Published: 31 Jul 2013

IBM

Leverage Security Intelligence for Government Agencies
sponsored by IBM
WHITE PAPER: This resource features a security intelligence platform that's paired with data analytics to help prevent, defend, remediate, and analyze more security incidents and policy violations than traditional information security systems.
Posted: 05 Mar 2014 | Published: 31 Mar 2013

IBM

Better Security Intelligence for the Finance Industry
sponsored by IBM
WHITE PAPER: A security intelligence platform is a key element for fighting the many threats the financial institution faces, and this white papers describes on such platform.
Posted: 19 Dec 2013 | Published: 31 Mar 2013

IBM

QRadar Risk Manager: Security Intelligence Keeps You Ahead of Threats
sponsored by IBM
WHITE PAPER: This white paper highlights an automated risk management solution that correlates information on asset vulnerabilities and device configurations to better predict risks before they occur.
Posted: 17 Dec 2013 | Published: 31 Jan 2013

IBM

Automated Log Management for Hybrid Cloud Environments
sponsored by VMware, Inc.
WHITE PAPER: In this white paper, discover a log management tool that addresses the needs of today's dynamic environment by providing quality of service, operational efficiency, and compliance features for optimum infrastructure and application service levels.
Posted: 18 Oct 2013 | Published: 13 May 2013

VMware, Inc.

How To: Creating Content Packs
sponsored by VMware, Inc.
WHITE PAPER: In this detailed white paper, explore content packs, the information they store, and best practices for content pack creation within Log Insight 1.0.
Posted: 18 Oct 2013 | Published: 31 Aug 2013

VMware, Inc.

Unclutter Your Data Center With Consolidated Log Management
sponsored by VMware, Inc.
WHITE PAPER: In this white paper, explore a consolidated logging system to avoid the risks that may occur in a complex IT environment, and feel confident in running a reliable and secure virtual data center.
Posted: 17 Oct 2013 | Published: 13 Jun 2013

VMware, Inc.

Log Analytics: Simplifying Complex IT Environments
sponsored by VMware, Inc.
WHITE PAPER: Access this white paper for interviews with IT operations teams looking for better ways to effectively collect, analyze, and harness key information from logs in today's complex IT environment.
Posted: 17 Oct 2013 | Published: 17 Oct 2013

VMware, Inc.

Proactive data security, audit and compliance solutions
sponsored by IBM
WHITE PAPER: Access this white paper for key information about a data management solution that supports enterprises in their entirety, and ensures automated, integrated compliance and security across all platforms.
Posted: 16 Oct 2013 | Published: 30 Apr 2013

IBM

Automated Log Analytics Critical For Security and Compliance Management
sponsored by VMware, Inc.
WHITE PAPER: Access this resource to uncover a new category of log analytics tools to accommodate the trend in virtual and cloud infrastructures for efficient troubleshooting, security, and compliance management.
Posted: 15 Oct 2013 | Published: 01 Jun 2013

VMware, Inc.

Overcoming Security Breaches and Minimizing the Impact
sponsored by Dell SecureWorks
WHITE PAPER: Uncover the top 10 things you should do to enhance the security of your enterprise and reduce the duration and impact of a security breach.
Posted: 23 May 2013 | Published: 23 May 2013

Dell SecureWorks

Tripwire Log Center Product Brief
sponsored by Tripwire, Inc.
WHITE PAPER: Consult this informative white paper to learn how log management is helping to better identify threats and deploy security information and event management systems (SIEM). Learn how you can uncover suspicious activities and improve security by reading this asset now.
Posted: 02 Oct 2012 | Published: 02 Oct 2012

Tripwire, Inc.
1 - 25 of 58 Matches Previous Page    1 2 3    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement