IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Log Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Event Log Monitoring
DEFINITION: The collection, storage, and reporting of log data from firewalls, routers, servers, applications, operating systems and devices in near real-time for compliance and risk mitigation.
Log Management Reports
1 - 25 of 140 Matches Previous Page  |  Next Page
Securing Virtual Data Centers from Malware
sponsored by BitDefender
EGUIDE: Access this expert guide for tips on giving your virtual environment the level of security it needs.
Posted: 23 Nov 2015 | Published: 23 Nov 2015


Smart Log Monitoring and Analysis: The Key to Security Success
sponsored by LogRhythm, Inc.
EGUIDE: This expert guide discusses how you can create a strategic log monitoring and analysis program that won't get in the way of your users' privacy.
Posted: 18 Nov 2015 | Published: 18 Nov 2015

LogRhythm, Inc.

Seven Questions to Ask Before Buying SIEM Products
sponsored by LogRhythm, Inc.
EGUIDE: This expert guide explores the most essential criteria to consider before purchasing your SIEM solution.
Posted: 17 Nov 2015 | Published: 17 Nov 2015

LogRhythm, Inc.

Security and Performance in One Cloud Infrastructure
sponsored by Oracle Corporation
VIDEO: This brief video explains how you can build a highly secure cloud infrastructure that offers equally effective performance.
Posted: 11 Nov 2015 | Premiered: 26 Oct 2015

Oracle Corporation

The Total Economic Impact of Comprehensive Security
sponsored by Alert Logic
WHITE PAPER: This white paper analyzes the TEI and ROI for one suite of security solutions and discusses how you can get the most out of your security spending.
Posted: 28 Oct 2015 | Published: 31 Dec 2014

Alert Logic

Case Study: Protecting Patient Data in the Public Cloud
sponsored by Alert Logic
WHITE PAPER: Access this case study to learn how a health organization secured delicate genomic data in a public cloud environment.
Posted: 27 Oct 2015 | Published: 27 Oct 2015

Alert Logic

Critical Capabilities for Security Information and Event Management
sponsored by LogRhythm, Inc.
WHITE PAPER: This vendor comparison reviews SIEM performance by three different use cases, showing you which SIEM platform works best for your business needs.
Posted: 27 Oct 2015 | Published: 21 Sep 2015

LogRhythm, Inc.

Practical Threat Management for Government Entities
sponsored by AlienVault
WHITE PAPER: Access this white paper for essential security tips tailored to the needs – and the budgets – of state and local governments.
Posted: 23 Oct 2015 | Published: 31 May 2015


Strengths and Cautions for 12 Managed Security Services
sponsored by IBM
WHITE PAPER: This Gartner report examines twelve leading MSS offerings and discusses strengths and cautions for each one.
Posted: 15 Oct 2015 | Published: 30 Dec 2014


Actionable Threat Intelligence to Manage Supply Chain Risk
sponsored by BrightPoint Security
WHITE PAPER: This white paper tackles the issue of cybersecurity within the supply chain, suggesting a method of shared security and threat intelligence to prevent third-party vendors from putting you at risk.
Posted: 08 Sep 2015 | Published: 27 Aug 2015

BrightPoint Security

Indicators of Compromise
sponsored by IBM
WHITE PAPER: This white paper presents indicators of compromise to look out for and outlines a four-step process for remediating these compromises.
Posted: 08 Sep 2015 | Published: 30 Jun 2015


Security School: Effective Analyze SIEM Data
sponsored by
VIRTUAL ENVIRONMENT: Achieving the promise of SIEM is a matter of understanding the technology, and this webcast series will help you do so. Watch these interesting presentations from a leading security expert to learn all you need to know to make SIEM work for you.
Posted: 04 Aug 2015 | Premiered: 10 May 2013

Test-Drive a Comprehensive Security Platform
sponsored by AlienVault
SOFTWARE DEMO: This trial software allows you to sample a security platform that gives you all the tools you need to secure yourself against today's advanced threats.
Posted: 30 Jul 2015 | Premiered: 30 Jul 2015


Understanding Real-time Log Analytics
sponsored by VMware
WHITE PAPER: With log analytics, you can conduct root-cause analysis to identify the source of a systems failure, for instance. If you have a log analytics system you can solve problems you didn't know you had and usually ten times faster than you would have without it. In this white paper you can learn more about the vital nature of log files.
Posted: 30 Jun 2015 | Published: 30 Jun 2015


Keep Your Network Secure with Threat Intelligence and SIEM
sponsored by Threatstream
EGUIDE: In this expert e-guide, discover how to integrate threat intelligence with SIEM for optimal network security.
Posted: 08 Apr 2015 | Published: 08 Apr 2015


Global Threat Intelligence Report
sponsored by Dimension Data
WHITE PAPER: This in-depth white paper can help you discover the latest security threats and how to stop them.
Posted: 26 Feb 2015 | Published: 31 Dec 2014

Dimension Data

Staying Compliant for On-the-Fly Investigations
sponsored by Dell Software
WHITE PAPER: Access this white paper and learn how to make sense of all of your data and remain compliant for on-the-fly investigations.
Posted: 23 Feb 2015 | Published: 04 Dec 2014

Dell Software

A Computer Weekly buyer's guide to log management
sponsored by
EBOOK: In this 13-page buyer's guide, Computer Weekly looks at how companies analyse server and security logs to tackle cybercrime and internal fraud;how application log management provides insight into application behaviour, which can be used to build better software;and how network administrators can use data from log files to automate security systems.
Posted: 19 Aug 2015 | Published: 19 Aug 2015

Computer Weekly – 21 July 2015: How the internet of things could save the honeybee
sponsored by
EZINE: In this week's Computer Weekly, with bee populations being decimated, we find out how the internet of things could save the honeybee. Amid fears that artificial intelligence could end human innovation, we hear from the experts on AI about the reality. And we examine the challenges of customer service in a multi-channel world. Read the issue now.
Posted: 17 Jul 2015 | Published: 17 Jul 2015

Computer Weekly July 2015: The Most Influential Women in UK IT
sponsored by
EZINE: In this week's Computer Weekly, we reveal our annual list of the 50 most influential women in UK IT – and talk to this year's winner, Citrix vice president Jacqueline de Rojas. Also, we look at how ARM chips are making inroads into the data centre as energy awareness becomes a growing corporate IT issue.
Posted: 10 Jul 2015 | Published: 10 Jul 2015

Computer Weekly – 7 July 2015: The IT behind Angry Birds
sponsored by
EZINE: In this week's Computer Weekly, we talk to the CIO of Rovio Entertainment, the company behind the gaming phenomenon Angry Birds, about how he supports a global business with a five-person IT team. We assess your options for moving off Windows Server 2003 now support is ending. And our buyer's guide looks at log management. Read the issue now.
Posted: 06 Jul 2015 | Published: 06 Jul 2015

Modern Infrastructure – November/December 2014
sponsored by
EZINE: As cloud computing, consumerization and virtualization trends converge, IT departments have been forced to re-think their strategy and tactics. Modern Infrastructure explores the impact of these shifts on data center infrastructure and guides IT managers in their decision making.
Posted: 02 Dec 2014 | Published: 02 Dec 2014

Extending Security Intelligence with Big Data
sponsored by IBM
WHITE PAPER: Learn how IBM Security Intelligence with Big Data can help organizations gain insights into advanced data threats.
Posted: 08 Oct 2014 | Published: 31 Jan 2013


Top 5 Truths About Big Data Hype and Security Intelligence
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This resource outlines the top five truths behind the Big Data hype and explains why Big Data Security Analytics (BDSA) is the future of security intelligence. Read on to learn how it offers the insight you need to perform real-time threat detection and defense.
Posted: 19 Aug 2014 | Published: 05 Sep 2013

Hewlett Packard Enterprise

Securing Enterprise Networks with a Sharp Eye and a Clear Plan
sponsored by
EBOOK: Enterprise networks are increasing in size and complexity, creating a larger attack surface for hackers. This TechGuide walks you through gaining visibility into your network and devising an effective security strategy.
Posted: 14 Aug 2014 | Published: 11 Aug 2014
1 - 25 of 140 Matches Previous Page    1 2 3 4    Next Page
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement