IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Log Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Event Log Monitoring
DEFINITION: The collection, storage, and reporting of log data from firewalls, routers, servers, applications, operating systems and devices in near real-time for compliance and risk mitigation.
Log ManagementReports
101 - 123 of 123 Matches Previous Page  |  Next Page
Pulling the Plug on Legacy Log Management
sponsored by Tripwire, Inc.
ANALYST BRIEF: When it comes to log management today, CSOs have been left in the lurch. According to this IDG Research Services survey, organizations are poised to “rip and replace” legacy technology to get a better handle on compliance and security. Read on to learn why so many are scrapping their old log management system and starting fresh.
Posted: 09 Apr 2010 | Published: 09 Apr 2010

Tripwire, Inc.

Presentation Transcript: Configuring and Using IBM i's Auditing Functions
sponsored by PowerTech
PRESENTATION TRANSCRIPT: Did you know that IBM i includes powerful auditing features? In fact, our own class-leading audit reporting solution leverages the information captured by this facility. Read this presentation transcipt - based on content presented at the 2009 COMMON conference - to learn about activating and configuring IBM i's built-in auditing capabilities.
Posted: 06 Apr 2010 | Published: 06 Apr 2010

PowerTech

The Case for Log Management Warehousing – An ESG Analyst Brief
sponsored by Hewlett-Packard Company
ANALYST BRIEF: As log management and analysis needs evolve, legacy products can’t scale, accommodate uncommon log file formats, or provide the right level of real-time or historical analysis. These requirements are driving a transition to a new model called log management warehousing.
Posted: 23 Mar 2010 | Published: 23 Mar 2010

Hewlett-Packard Company

Configuring and Using IBM i's Auditing Functions
sponsored by PowerTech
WEBCAST: Did you know that IBM i includes powerful auditing features? In fact, our own class-leading audit reporting solution leverages the information captured by this facility. Join this webinar-based on content presented at the 2009 COMMON conference-to learn about activating and configuring IBM i's built-in auditing capabilities.
Posted: 03 Mar 2010 | Premiered: Mar 3, 2010

PowerTech

Combat Cybercrime, Demonstrate Compliance and Streamline IT Operations
sponsored by ArcSight, an HP Company
WHITE PAPER: This whitepaper discusses the requirements for a universal log management solution and specifically describes how ArcSight Logger 4 delivers on those requirements. A recent cyberespionage incident at Boeing Corporation is highlighted as an example. Read more to find out.
Posted: 02 Mar 2010 | Published: 02 Mar 2010

ArcSight, an HP Company

Webinar: Implementing Powerful IT Search on the Cloud
sponsored by RightScale
WEBCAST: Traditional, static approaches to managing IT data simply aren't built for the cloud. In this webinar, Splunk provides an alternative that is dynamic and easily deployed using the RightScale Platform.
Posted: 01 Mar 2010 | Premiered: Mar 1, 2010

RightScale

Keeping Up with PCI: Implementing Network Segmentation and Monitoring Security Controls
sponsored by SonicWALL
EGUIDE: Read this expert e-guide to get tips on establishing a process for logging activity and tying records to users, learn three main requirements for testing security controls, and find out how to implement PCI network segmentation and how it may ease PCI compliance for your organization.
Posted: 04 Feb 2010 | Published: 04 Feb 2010

SonicWALL

Securing Virtualized Data Centers
sponsored by Trend Micro, Inc.
EBOOK: On the surface, virtualized datacenters appear to have all of the same vulnerabilities and security challenges as conventional datacenters. With virtual machines, new challenges minimize the effectiveness of traditional protections. Read on to learn what it takes to secure today’s virtualized data centers.
Posted: 14 Dec 2009 | Published: 14 Dec 2009

Trend Micro, Inc.

U.S. Navy Cyber Defense Operations Command
sponsored by Novell, Inc.
WHITE PAPER: Using Novell® Sentinel™ as part of its PROMETHEUS system, the Navy Cyber Defense Operations Command (NCDOC) has automated and centralized security monitoring across hundreds of diverse locations worldwide.
Posted: 09 Dec 2009 | Published: 08 Dec 2009

Novell, Inc.

Secure, Simple and Powerful Log Management with Novell® Sentinel™ Log Manager
sponsored by Novell, Inc.
WHITE PAPER: Read this whitepaper to find out how Novell's Sentinel™ Log Management solution simplifies compliance by collecting, storing, analyzing and managing data logs from all across your enterprise.
Posted: 09 Dec 2009 | Published: 08 Dec 2009

Novell, Inc.

Novell® Sentinel™ Log Manager: Secure, Simple and Powerful Log Management
sponsored by Novell, Inc.
WHITE PAPER: Learn how Novell's Sentinel Log Manager allows organizations to simplify their compliance efforts, reduce deployment and management costs, and build a scalable compliance and security foundation that grows with their needs.
Posted: 09 Dec 2009 | Published: 08 Mar 2011

Novell, Inc.

The Essentials Series: Security Information Management
sponsored by Dell SecureWorks
WHITE PAPER: This collection of articles from Realtime Publishers presents a clear and concise overview of security information management (SIM). The articles present the business case for SIM, operational and organizational issues, and hints and tips for ensuring a successful SIM implementation.
Posted: 02 Dec 2009 | Published: 09 Oct 2009

Dell SecureWorks

Novell® Sentinel™: Active Event Monitoring for Improved Security and Compliance Management
sponsored by Novell, Inc.
WHITE PAPER: Novell Sentinel combines the benefits of identity and systems management with real-time security event management and monitoring. It gives you a comprehensive, real-time dashboard view of user, network and application events, so your IT staff can be much more responsive to potential threats.
Posted: 06 Oct 2009 | Published: 06 Oct 2009

Novell, Inc.

Simplifying Log Collection, Storage and Analysis
sponsored by ArcSight, an HP Company
PRODUCT OVERVIEW: ArcSight Logger is a turnkey appliance for collection, efficient storage, and high-performance search and reporting of all enterprise log data. Read this paper to learn more details.
Posted: 29 Sep 2009 | Published: 29 Sep 2009

ArcSight, an HP Company

Robot/SCHEDULE Enterprise
sponsored by Help/Systems
WEBCAST: Are you prepared for your next audit? This webcast explores a new tool that expands job scheduling and server management to your server. Discover how this approach can help your organization pass its next audit with ease.
Posted: 24 Sep 2009 | Premiered: Sep 17, 2009

Help/Systems

Drive Your Enterprise with Event-Driven Scheduling
sponsored by Help/Systems
WHITE PAPER: Use Event Monitors to create an event-driven schedule for your enterprise using system events on your Windows, UNIX, and Linux servers to launch reactive jobs through Robot/SCHEDULE.
Posted: 17 Sep 2009 | Published: 17 Sep 2009

Help/Systems

LogRhythm 3-Minute Product Demo
sponsored by LogRhythm, Inc.
PRODUCT DEMO: This 3 ½ minute overview will give you an introduction to the LogRhythm solution and how it empowers organizations to comply with regulations in audit, secure their networks and optimize their IT infrastructure.
Posted: 09 Sep 2009 | Premiered: 09 Sep 2009

LogRhythm, Inc.

Overcoming the Three Biggest PCI Challenges
sponsored by Alert Logic
PRESENTATION TRANSCRIPT: PCI is expensive and difficult to sustain, and many breaches occur after passing an audit. Read this presentation transcript, based on the wencast of the same name, and discover how a cloud-based solution addresses the top 3 pain points and common pitfalls of PCI compliance.
Posted: 20 Aug 2009 | Published: 19 Aug 2009

Alert Logic

Server Monitoring: Centralize and Win
sponsored by TNT Software, Inc.
WHITE PAPER: One of the main limitations of native tools in a Windows OS is that it stores all of the event & performance logs information locally in each individual system. For an environment with multiple systems, this makes problem analysis much more challenging. This paper will discuss the importance of effective, centralized management solutions.
Posted: 13 Aug 2009 | Published: 12 Aug 2009

TNT Software, Inc.

PCI Compliance Made Simple
sponsored by Alert Logic
WHITE PAPER: Major data breaches have caused untold damage. These unfortunate events have led to the creation of a data security standard (PCI DSS) that all payment card industry members must comply to. This white paper helps to simplify and provide a deeper understanding of the PCI DSS v1.1 and discusses best practices to achieve PCI compliance.
Posted: 20 Jul 2009 | Published: 20 Feb 2008

Alert Logic

Log Management E-book
sponsored by RSA, The Security Division of EMC
EBOOK: Log management is covering several important aspects of network security. The four major chapters of this E-book focus on the use of log management as it pertains to compliance, analysis, forensics, and an SIEM alternative. Read on to learn more.
Posted: 24 Jun 2009 | Published: 24 Jun 2009

RSA, The Security Division of EMC

Return on Investment (ROI) and Security Information and Event Management (SIEM): How RSA enVision Delivers an Industry Best ROI
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This White Paper examines the Return on Investment (ROI) that a quality Security Information & Event Management (SIEM) solution can deliver to an organization.
Posted: 22 Jun 2009 | Published: 01 Jun 2009

RSA, The Security Division of EMC

Information Security Magazine, June 2009 - SIMs: More than just a pile of logs
sponsored by Information Security Magazine
EZINE: This month's issue of Information Security Magazine covers a breadth of topics. The cover story this month is about SIM and how it can boost compliance, visibility, and overall business intelligence. Other featured articles cover risk management, convergence, and even the security concerns that come with cloud computing. Read on to learn more.
Posted: 10 Jun 2009 | Published: 10 Jun 2009

Information Security Magazine
101 - 123 of 123 Matches Previous Page    3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement