IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Log Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Event Log Monitoring
DEFINITION: The collection, storage, and reporting of log data from firewalls, routers, servers, applications, operating systems and devices in near real-time for compliance and risk mitigation.
Log ManagementWhite Papers (View All Report Types)
26 - 50 of 67 Matches Previous Page  | Next Page
Automation Suite for NERC CIP Compliance
sponsored by LogRhythm, Inc.
WHITE PAPER: Uncover how a particular NERC CIP compliance suite provides the tools and out-of-the-box assistance you need to address numerous NERC CIP requirements, including Electronic Security Perimeter, Incident Reporting and Planning, Vulnerability Detection, and many more.
Posted: 05 Sep 2013 | Published: 29 Mar 2013

LogRhythm, Inc.

Simplifying your Compliance Strategy
sponsored by LogRhythm, Inc.
WHITE PAPER: Explore the ins and outs of the Gramm-Leach-Bliley Act (GLBA) and how it protects customer records and information. In addition, explore the consequences of non-compliance and learn how a particular log management solution can help you ease the compliance and reporting process.
Posted: 04 Sep 2013 | Published: 31 Oct 2012

LogRhythm, Inc.

Leverage Security Intelligence for Energy and Utilities Companies
sponsored by IBM
WHITE PAPER: Learn how an integrated security intelligence platform provides the necessary components to help energy and utilities companies automate compliance and risk management, detect and manage threats, and protect the smart grid from both security breaches and cyber-attacks.
Posted: 21 Aug 2013 | Published: 31 Jul 2013

IBM

Boosting Enterprise Security with Integrated Log Management
sponsored by IBM
WHITE PAPER: Explore how replacing your legacy, siloed log management systems with an integrated approach is crucial to reducing security risks and improving compliance across your diverse IT environments.
Posted: 21 Aug 2013 | Published: 31 May 2013

IBM

Overcoming Security Breaches and Minimizing the Impact
sponsored by Dell SecureWorks
WHITE PAPER: Uncover the top 10 things you should do to enhance the security of your enterprise and reduce the duration and impact of a security breach.
Posted: 23 May 2013 | Published: 23 May 2013

Dell SecureWorks

SIEM: Utilizing Big Data Security Analytics
sponsored by LogRhythm, Inc.
WHITE PAPER: This report reviews an analysis tool that can help simplify logging and event management, allowing you to more easily separate problems and key events from normal background activity – even in the face of Big Data. Read on now to learn more.
Posted: 04 Feb 2013 | Published: 31 Dec 2012

LogRhythm, Inc.

The SIEM Advantage
sponsored by Hewlett-Packard Company
WHITE PAPER: Consult this concise white paper for an overview of the advantages your organization can gain by investing in a Security Information and Event Management (SIEM) solution. Discover SIEM benefits and caveats, how you can overcome key security challenges, the business justification for SIEM, and more.
Posted: 27 Dec 2012 | Published: 14 Dec 2012

Hewlett-Packard Company

Automated Log Analytics Critical For Security and Compliance Management
sponsored by VMware, Inc.
WHITE PAPER: Access this resource to uncover a new category of log analytics tools to accommodate the trend in virtual and cloud infrastructures for efficient troubleshooting, security, and compliance management.
Posted: 15 Oct 2013 | Published: 01 Jun 2013

VMware, Inc.

Tripwire Log Center Product Brief
sponsored by Tripwire, Inc.
WHITE PAPER: Consult this informative white paper to learn how log management is helping to better identify threats and deploy security information and event management systems (SIEM). Learn how you can uncover suspicious activities and improve security by reading this asset now.
Posted: 02 Oct 2012 | Published: 02 Oct 2012

Tripwire, Inc.

Smart, Visible and Automated: The New Log Management
sponsored by Tripwire, Inc.
WHITE PAPER: View this informative white paper to learn more about moving to a more advanced risk protection policy. Improve your log management capabilities by implementing functionality with SIEM, file integrity monitoring and more!
Posted: 27 Sep 2012 | Published: 28 Sep 2012

Tripwire, Inc.

Security Information and Event Management: Unique McAfee data management technology
sponsored by McAfee, Inc.
WHITE PAPER: This paper explores and refutes the common myths of data management in SIEM/logging, the key challenges and requirements for an effective solution, and how the uniqueness of McAfee EDB satisfies these requirements.
Posted: 23 Mar 2012 | Published: 23 Mar 2012

McAfee, Inc.

NetIQ Sentinel 7 Review - Real-time SEIM and Log Manangement for Today
sponsored by NetIQ
WHITE PAPER: This paper offers a functional review of the latest NetIQ offering in security information and event management (SIEM) that effectively address log management issues. View now to explore how NetIQ performs in event correlation alerting, security intelligence and trend analysis and more.
Posted: 13 Mar 2012 | Published: 13 Mar 2012

NetIQ

LogRhythm and NERC
sponsored by LogRhythm, Inc.
WHITE PAPER: The NERC CIP Cyber Security Standards is intended to ensure the protection of the Critical Cyber Assets that control or effect the reliability of North America’s bulk electric systems. View this paper to explore how LogRhythm's NERC CIP Compliance package provides out-of-the box assistance in addressing numerous NERC CIP requirements.
Posted: 27 Feb 2012 | Published: 24 Feb 2012

LogRhythm, Inc.

Continuous Monitoring: Responding to New Threats in More Complex IT Environments
sponsored by Tripwire, Inc.
WHITE PAPER: Governments today are focusing on the practice of continuous monitoring as a means to providing the much needed balance between data access and protection. In this paper, learn more about continuous monitoring, including what is it and why it’s needed, guidelines for implementing it, key capabilities of an effective solution, and more.
Posted: 24 Feb 2012 | Published: 24 Feb 2012

Tripwire, Inc.

Best Practices for Enhancing Microsoft Exchange Server 2010 Data Protection and Availability using Dell EqualLogic Snapshots
sponsored by Dell, Inc.
WHITE PAPER: IT leaders are challenged by the growth of the amount of data they have to manage. While data management encompasses several areas of an organization, ensuring the data protection and business continuity is one of the most critical aspects. Inside this white paper, uncover strategies for avoiding data loss and lack of application availability.
Posted: 02 Dec 2011 | Published: 02 Dec 2011

Dell, Inc.

Find the Needle in the Haystack – Audit and Compliance Reporting for AIX
sponsored by Safestone Technologies
WHITE PAPER: This white paper discusses how organizations can address the challenge of meeting audit and compliance regulations, whilst driving down costs and reducing risk. It outlines how Safestone’s Compliance Center for AIX solution efficiently collects raw data and refines it into easy-to-understand, actionable information.
Posted: 04 Nov 2011 | Published: 04 Nov 2011

Safestone Technologies

HP ArcSight Express 3.0
sponsored by HP Enterprise Security.
WHITE PAPER: View this white paper to explore how to maintain the security of your corporate IT assets by detecting more incidents and addressing larger set of log data with HP ArcSight SIEM solutions.
Posted: 28 Oct 2011 | Published: 28 Oct 2011

HP Enterprise Security.

No Blind Spots in Perimeter Security with Security Event Information Management
sponsored by Radware
WHITE PAPER: Security Event Information Management (SEIM) can provide the security leap-frog in a world of point solutions – to ensure there are no blind spots in your network security architecture.
Posted: 10 Oct 2011 | Published: 10 Oct 2011

Radware

Virtual Compliance In The VMware Automated Data Center
sponsored by LogLogic, Inc.
WHITE PAPER: Switching to a virtual infrastructure not only provides benefits, but also comes with significant change, and organizations must find new ways to collect and manage logs. This paper explores log management in virtualized environments, including its challenges and opportunities.
Posted: 21 Jul 2011 | Published: 21 Jul 2011

LogLogic, Inc.

Scalability in Log Management
sponsored by ArcSight, an HP Company
WHITE PAPER: This paper will take you through the process of selecting a log management solution for your organization. It will provide you with information about log management, as well as the requirements you should be looking for in a log management solution.
Posted: 17 May 2011 | Published: 17 May 2011

ArcSight, an HP Company

The Complete Guide to Log and Event Management
sponsored by Novell, Inc.
WHITE PAPER: This white paper will provide you with the information you need to purchase an Event and Log Management soutions. This paper outlines both the upside and downside to using both these services sepearte and together.
Posted: 11 May 2011 | Published: 11 May 2011

Novell, Inc.

Novell Sentinel: Active Event Monitoring for Improved Security and Compliance Management
sponsored by Novell, Inc.
WHITE PAPER: Novell Sentinel represents a turning point for enterprises. Costly, time-consuming, error-prone manual processes can now be replaced with an automated, rigorous and predictable security- and compliance monitoring program.
Posted: 11 May 2011 | Published: 11 May 2011

Novell, Inc.

Simplify Compliance and Security with Novell® SentinelT Log Manager
sponsored by Novell, Inc.
WHITE PAPER: Finding a log management solution that can manage risk, simplify regulatory compliance and provide security for you network can be very difficult. There are many systems that contain some of these tools but now there is a system that can do all of this.
Posted: 11 May 2011 | Published: 11 May 2011

Novell, Inc.

The Complete Guide to Log and Event Management
sponsored by Novell, Inc.
WHITE PAPER: This paper analyzes the relationship between SIEM and log management - focusing not only on the technical differences and different uses for these technologies, but also on architecting their joint deployments.
Posted: 07 Mar 2011 | Published: 07 Mar 2011

Novell, Inc.

Simplify Compliance and Security with Novell® Sentinel™ Log Manager
sponsored by Novell, Inc.
WHITE PAPER: Novell Sentinel Log Manager is delivered as an all-inclusive software appliance that enables organizations to improve IT enterprise security and simplify regulatory compliance in a cost-effective and easy way. Novell Sentinel Log Manager cuts through deployment and management cost and complexity with the expensive proprietary hardware.
Posted: 07 Mar 2011 | Published: 07 Mar 2011

Novell, Inc.
26 - 50 of 67 Matches Previous Page    1 2 3    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement