IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Log Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Event Log Monitoring
DEFINITION: The collection, storage, and reporting of log data from firewalls, routers, servers, applications, operating systems and devices in near real-time for compliance and risk mitigation.
Log ManagementReports
51 - 75 of 137 Matches Previous Page  | Next Page
6 Point SIEM Solution Evaluation Checklist
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchSecurity.com explores the top six evaluation criteria you should keep in mind when investing in a security information and event management (SIEM) solution. View now to learn more!
Posted: 24 Apr 2013 | Published: 24 Apr 2013

SearchSecurity.com

Effective print security for SMBs
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Louella Fernandes and Clive Longbottom  discuss how integrated print management provides SMBs with a simple and scalable approach for print security.
Posted: 02 Apr 2013 | Published: 02 Apr 2013

ComputerWeekly.com

SIM Technical Guide
sponsored by SearchSecurity.com
EZINE: In this SearchSecurity.com Technical Guide on security information and event management (SIEM) systems, we explore the current state of SIEMs in the enterprise today and whether augmentation, cloud service, or rip and repair is your best upgrade option.
Posted: 08 Mar 2013 | Published: 08 Mar 2013

SearchSecurity.com

Virtualization Security: Protecting Virtualized Environments
sponsored by ComputerWeekly.com
BOOK: This extract from the book Virtualization Security, includes a 30% discount for Computer Weekly readers.
Posted: 20 Feb 2013 | Published: 20 Feb 2013

ComputerWeekly.com

SIEM: Utilizing Big Data Security Analytics
sponsored by LogRhythm, Inc.
WHITE PAPER: This report reviews an analysis tool that can help simplify logging and event management, allowing you to more easily separate problems and key events from normal background activity – even in the face of Big Data.
Posted: 04 Feb 2013 | Published: 31 Dec 2012

LogRhythm, Inc.

The SIEM Advantage
sponsored by Hewlett-Packard Company
WHITE PAPER: Consult this concise white paper for an overview of the advantages your organization can gain by investing in a Security Information and Event Management (SIEM) solution. Discover SIEM benefits and caveats, how you can overcome key security challenges, the business justification for SIEM, and more.
Posted: 27 Dec 2012 | Published: 14 Dec 2012

Hewlett-Packard Company

Effective Ways to Search Log Files
sponsored by SearchSecurity.com
EGUIDE: Security log analysis is essential for effective security and risk management. But with countless logs generated every day, searching log files can be a burdensome headache. In this e-guide, expert John Burke uncovers the best methods for thorough security log analysis with an evolutionary path that mixes old concepts with new ones.
Posted: 05 Apr 2012 | Published: 05 Apr 2012

SearchSecurity.com

Technical Guide on SIM: Moving beyond network security toward protecting applications
sponsored by SearchSecurity.com
EGUIDE: SIMs have been widely adopted for their value in correlating, reporting and alerting on network security. But SIMs can be used for more than just network security monitoring. The same tools can also bring value to application managers if used correctly. In this technical guide, gain 4 steps for integrating applications into enterprise SIMs.
Posted: 01 Jan 2012 | Published: 20 Dec 2011

SearchSecurity.com

Security Information Management Systems Aspire to Real-Time Security
sponsored by Hewlett-Packard Company
EGUIDE: Explore security information management (SIM) systems' capabilities for real-time security, learn why the definition of "real-time" may need altering, and uncover the factors preventing SIMs from attaining real-time status.
Posted: 24 Apr 2013 | Published: 24 Apr 2013

Hewlett-Packard Company

Enterprise Security: Why you need Effective Log Management
sponsored by SearchCompliance.com
EBOOK: For many, collecting and maintaining logs is a compliance requirement. But IT leaders will soon discover that there are many other practical reasons for maintaining logs. Access today's resource to uncover ways in which log management can tighten data security and boost overall IT performance.
Posted: 23 Apr 2013 | Published: 23 Apr 2013

SearchCompliance.com

Solution Spotlight: How Secure Managed File Transfers Help Meet Compliance Requirements
sponsored by IBM and SI Architects
EGUIDE: This expert E-Guide explores the steps enterprises need to take to secure file transfer and regulatory compliance. Read on and learn how organizations can ensure file transfer security today.
Posted: 20 Feb 2013 | Published: 20 Feb 2013

IBM and SI Architects

Presentation Transcript: The Top 5 Pitfalls of Log Management and SIEM Deployments and How to Avoid Them
sponsored by eIQnetworks
PRESENTATION TRANSCRIPT: This valuable resource counts down the top 5 pitfalls of log management and security information and event management (SIEM) deployments and offers essential advice for avoiding these challenges and achieving SIEM success.
Posted: 15 Feb 2013 | Published: 04 Feb 2013

eIQnetworks

Inside IT: Stopping Security Threats in an Ever-Changing Landscape
sponsored by Intel
PODCAST: In this podcast, Intel's CISO Malcolm Harkins discusses the ever-changing security and threat landscapes and explains why adding advanced protection to your current systems is crucial to staying secure.
Posted: 27 Dec 2012 | Premiered: Dec 27, 2012

Intel

Log Management and SIEM: Build a Solid Foundation for Compliance
sponsored by McAfee, Inc.
EGUIDE: This expert e-guide explores how enterprise log management and SIEM tools can be used to build a foundation for ensured compliance in your organizations and offers key tips for choosing the tools that meet your organization's compliance needs – click through to learn more.
Posted: 20 Nov 2012 | Published: 20 Nov 2012

McAfee, Inc.

Tripwire Log Center Product Brief
sponsored by Tripwire, Inc.
WHITE PAPER: Consult this informative white paper to learn how log management is helping to better identify threats and deploy security information and event management systems (SIEM). Learn how you can uncover suspicious activities and improve security by reading this asset now.
Posted: 02 Oct 2012 | Published: 02 Oct 2012

Tripwire, Inc.

Smart, Visible and Automated: The New Log Management
sponsored by Tripwire, Inc.
WHITE PAPER: View this informative white paper to learn more about moving to a more advanced risk protection policy. Improve your log management capabilities by implementing functionality with SIEM, file integrity monitoring and more!
Posted: 27 Sep 2012 | Published: 28 Sep 2012

Tripwire, Inc.

University of the Sunshine Coast Improves Security with Sentinel
sponsored by NetIQ
CASE STUDY: Access this case study to uncover how Sentinel helped one educational institution cost-effectively meet audit requirements for monitoring access to core finance systems, provide simpler access to network resources for users while improving security.
Posted: 18 May 2012 | Published: 17 May 2012

NetIQ

The changing SIEM landscape: What you should know to stay ahead
sponsored by SearchSecurity.com
EGUIDE: While SIEM systems are often expensive and complex, they play a vital part in your risk and compliance strategy. This technical guide on SIM explores SIEM technologies today and offers exclusive tips and considerations for your deployment.
Posted: 19 Apr 2012 | Published: 19 Apr 2012

SearchSecurity.com

Improving regulatory compliance management through log analysis, SIM
sponsored by HP Enterprise Security
EGUIDE: This E-Guide highlights the importance of log analysis and security information and event management (SIEM) in improving regulatory compliance management.
Posted: 30 Mar 2012 | Published: 30 Mar 2012

HP Enterprise Security

Security Information and Event Management: Unique McAfee data management technology
sponsored by McAfee, Inc.
WHITE PAPER: This paper explores and refutes the common myths of data management in SIEM/logging, the key challenges and requirements for an effective solution, and how the uniqueness of McAfee EDB satisfies these requirements.
Posted: 23 Mar 2012 | Published: 23 Mar 2012

McAfee, Inc.

NetIQ Sentinel 7 Review - Real-time SEIM and Log Manangement for Today
sponsored by NetIQ
WHITE PAPER: This paper offers a functional review of the latest NetIQ offering in security information and event management (SIEM) that effectively address log management issues. View now to explore how NetIQ performs in event correlation alerting, security intelligence and trend analysis and more.
Posted: 13 Mar 2012 | Published: 13 Mar 2012

NetIQ

LogRhythm and NERC
sponsored by LogRhythm, Inc.
WHITE PAPER: The NERC CIP Cyber Security Standards is intended to ensure the protection of the Critical Cyber Assets that control or effect the reliability of North America’s bulk electric systems. View this paper to explore how LogRhythm's NERC CIP Compliance package provides out-of-the box assistance in addressing numerous NERC CIP requirements.
Posted: 27 Feb 2012 | Published: 24 Feb 2012

LogRhythm, Inc.

Continuous Monitoring: Responding to New Threats in More Complex IT Environments
sponsored by Tripwire, Inc.
WHITE PAPER: Governments today are focusing on the practice of continuous monitoring as a means to providing the much needed balance between data access and protection. In this paper, learn more about continuous monitoring, including what is it and why it’s needed, guidelines for implementing it, key capabilities of an effective solution, and more.
Posted: 24 Feb 2012 | Published: 24 Feb 2012

Tripwire, Inc.

Predictive Security Intelligence for Retail Organizations
sponsored by Q1 Labs, an IBM Company
WEBCAST: This webcast explores how to add a new dimension to security intelligence through risk management. Extend the value of SIEM and Log Management to determine risk levels throughout your network by integrating vulnerability assessment scan results, network behavior analysis and topology, device configurations, policies, and compliance management.
Posted: 24 Feb 2012 | Premiered: Feb 24, 2012

Q1 Labs, an IBM Company

Best Practices for Enhancing Microsoft Exchange Server 2010 Data Protection and Availability using Dell EqualLogic Snapshots
sponsored by Dell, Inc.
WHITE PAPER: IT leaders are challenged by the growth of the amount of data they have to manage. While data management encompasses several areas of an organization, ensuring the data protection and business continuity is one of the most critical aspects. Inside this white paper, uncover strategies for avoiding data loss and lack of application availability.
Posted: 02 Dec 2011 | Published: 02 Dec 2011

Dell, Inc.
51 - 75 of 137 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement