IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Log Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Event Log Monitoring
DEFINITION: The collection, storage, and reporting of log data from firewalls, routers, servers, applications, operating systems and devices in near real-time for compliance and risk mitigation.
Log ManagementReports
126 - 134 of 134 Matches Previous Page  |  Next Page
Robot/SCHEDULE Enterprise
sponsored by Help/Systems
WEBCAST: Are you prepared for your next audit? This webcast explores a new tool that expands job scheduling and server management to your server. Discover how this approach can help your organization pass its next audit with ease.
Posted: 24 Sep 2009 | Premiered: Sep 17, 2009

Help/Systems

Drive Your Enterprise with Event-Driven Scheduling
sponsored by Help/Systems
WHITE PAPER: Use Event Monitors to create an event-driven schedule for your enterprise using system events on your Windows, UNIX, and Linux servers to launch reactive jobs through Robot/SCHEDULE.
Posted: 17 Sep 2009 | Published: 17 Sep 2009

Help/Systems

LogRhythm 3-Minute Product Demo
sponsored by LogRhythm, Inc.
PRODUCT DEMO: This 3 ½ minute overview will give you an introduction to the LogRhythm solution and how it empowers organizations to comply with regulations in audit, secure their networks and optimize their IT infrastructure.
Posted: 09 Sep 2009 | Premiered: 09 Sep 2009

LogRhythm, Inc.

Overcoming the Three Biggest PCI Challenges
sponsored by Alert Logic
PRESENTATION TRANSCRIPT: PCI is expensive and difficult to sustain, and many breaches occur after passing an audit. Read this presentation transcript, based on the wencast of the same name, and discover how a cloud-based solution addresses the top 3 pain points and common pitfalls of PCI compliance.
Posted: 20 Aug 2009 | Published: 19 Aug 2009

Alert Logic

Server Monitoring: Centralize and Win
sponsored by TNT Software, Inc.
WHITE PAPER: One of the main limitations of native tools in a Windows OS is that it stores all of the event & performance logs information locally in each individual system. For an environment with multiple systems, this makes problem analysis much more challenging. This paper will discuss the importance of effective, centralized management solutions.
Posted: 13 Aug 2009 | Published: 12 Aug 2009

TNT Software, Inc.

PCI Compliance Made Simple
sponsored by Alert Logic
WHITE PAPER: Major data breaches have caused untold damage. These unfortunate events have led to the creation of a data security standard (PCI DSS) that all payment card industry members must comply to. This white paper helps to simplify and provide a deeper understanding of the PCI DSS v1.1 and discusses best practices to achieve PCI compliance.
Posted: 20 Jul 2009 | Published: 20 Feb 2008

Alert Logic

Log Management E-book
sponsored by RSA, The Security Division of EMC
EBOOK: Log management is covering several important aspects of network security. The four major chapters of this E-book focus on the use of log management as it pertains to compliance, analysis, forensics, and an SIEM alternative. Read on to learn more.
Posted: 24 Jun 2009 | Published: 24 Jun 2009

RSA, The Security Division of EMC

Return on Investment (ROI) and Security Information and Event Management (SIEM): How RSA enVision Delivers an Industry Best ROI
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This White Paper examines the Return on Investment (ROI) that a quality Security Information & Event Management (SIEM) solution can deliver to an organization.
Posted: 22 Jun 2009 | Published: 01 Jun 2009

RSA, The Security Division of EMC

Information Security Magazine, June 2009 - SIMs: More than just a pile of logs
sponsored by Information Security Magazine
EZINE: This month's issue of Information Security Magazine covers a breadth of topics. The cover story this month is about SIM and how it can boost compliance, visibility, and overall business intelligence. Other featured articles cover risk management, convergence, and even the security concerns that come with cloud computing. Read on to learn more.
Posted: 10 Jun 2009 | Published: 10 Jun 2009

Information Security Magazine
126 - 134 of 134 Matches Previous Page    4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement