IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Log Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Event Log Monitoring
DEFINITION: The collection, storage, and reporting of log data from firewalls, routers, servers, applications, operating systems and devices in near real-time for compliance and risk mitigation.
Log ManagementReports
76 - 100 of 133 Matches Previous Page  | Next Page
Debunking APT myths: What it really means and what you can do about it
sponsored by SearchSecurity.com
EGUIDE: This E-Guide defines APT, dispels common myths and explains what you can do about this adversary. Additionally, uncover why the idea of keeping intruders out with traditional, perimeter-based security is useless against APT and how you can best protect against modern security threats.
Posted: 29 Jul 2011 | Published: 29 Jul 2011

SearchSecurity.com

e-Guide: Evolving IT security threats: Inside Web-based, social engineering attacks
sponsored by SearchSecurity.com
EGUIDE: Defending IT infrastructure involves understanding attack methods that are effective today. This expert e-guide highlights several characteristics of modern computer security threats to keep in mind as you assess and improve your information security program, and provides recommendations for dealing with them.
Posted: 24 Jun 2011 | Published: 24 Jun 2011

SearchSecurity.com

HP ArcSight Express 3.0
sponsored by HP Enterprise Security.
WHITE PAPER: View this white paper to explore how to maintain the security of your corporate IT assets by detecting more incidents and addressing larger set of log data with HP ArcSight SIEM solutions.
Posted: 28 Oct 2011 | Published: 28 Oct 2011

HP Enterprise Security.

No Blind Spots in Perimeter Security with Security Event Information Management
sponsored by Radware
WHITE PAPER: Security Event Information Management (SEIM) can provide the security leap-frog in a world of point solutions – to ensure there are no blind spots in your network security architecture.
Posted: 10 Oct 2011 | Published: 10 Oct 2011

Radware

Presentation Transcript: Incident Response - Are you prepared?
sponsored by Dell SecureWorks
PRESENTATION TRANSCRIPT: In this presentation transcript, Lee Lawson, Head of Response Service for Dell SecureWorks EMEA outlines a successful Incident Response approach and best practices for your organisation.
Posted: 30 Aug 2011 | Published: 30 Aug 2011

Dell SecureWorks

SearchSecurity.com E-Guide: Database Security Best Practices: Tuning database audit tools
sponsored by IBM
EGUIDE: Auditing is a key component to security and compliance, and a widely accepted practice by IT operations. In this expert tip, you’ll find an in-depth overview of the tools required to create and collect successful database audits, as well as a set of best practices for tuning audit tools.
Posted: 25 Aug 2011 | Published: 25 Aug 2011

IBM

Log Management Best Practices: Six Tips for Success
sponsored by SearchSecurity.com
EGUIDE: The right log management tool can go a long way toward reducing the burden of managing enterprise system log data. However, the righ tool can quickly become the wrong tool unless an organization invests the time and effort required to make the most of it. Diana Kelley offers six log management best practices to ensure a successful implementation.
Posted: 25 Aug 2011 | Published: 01 Aug 2011

TOPICS:  Log Management
SearchSecurity.com

Technical Guide on SIM
sponsored by SearchSecurity.com
EGUIDE: Security information and event management solutions are an indispensible technology in IT security programs to help solidify data protection and compliance initiatives. In this comprehensive guide to SIM, our experts provide authoritative technical advice to help ensure effective SIM deployments and proper on-going maintenance.
Posted: 16 Aug 2011 | Published: 16 Aug 2011

SearchSecurity.com

Information Security IT Decision Checklist: Security Information and Event Management
sponsored by ArcSight, an HP Company
EGUIDE: This Information Security IT Decision Checklist explores key business and technical areas you should consider before selecting a security information and event management system. Also included in this guide is a list of SIMs and log management vendors to help in your decision process.
Posted: 28 Jul 2011 | Published: 28 Jul 2011

ArcSight, an HP Company

Virtual Compliance In The VMware Automated Data Center
sponsored by LogLogic, Inc.
WHITE PAPER: Switching to a virtual infrastructure not only provides benefits, but also comes with significant change, and organizations must find new ways to collect and manage logs. This paper explores log management in virtualized environments, including its challenges and opportunities.
Posted: 21 Jul 2011 | Published: 21 Jul 2011

LogLogic, Inc.

How to collect Windows Event logs to detect a targeted attack
sponsored by M86 Security
EGUIDE: Targeted attacks are growing, and eventually your enterprise will be a target. In this e-guide, expert Richard Bejtlich covers how to collect Windows Event logs to detect an intrusion.
Posted: 13 Jul 2011 | Published: 13 Jul 2011

M86 Security

AGESIC (Uraguay)
sponsored by IBM
CASE STUDY: Working with IBM and IBM® Business Partner Urudata Software, AGESIC has implemented a multitier architecture that provides a comprehensive security solution for e-government services and addresses transport security, access control and identity management.
Posted: 01 Jul 2011 | Published: 30 Jun 2011

IBM

Scalability in Log Management
sponsored by ArcSight, an HP Company
WHITE PAPER: This paper will take you through the process of selecting a log management solution for your organization. It will provide you with information about log management, as well as the requirements you should be looking for in a log management solution.
Posted: 17 May 2011 | Published: 17 May 2011

ArcSight, an HP Company

The Complete Guide to Log and Event Management
sponsored by Novell, Inc.
WHITE PAPER: This white paper will provide you with the information you need to purchase an Event and Log Management soutions. This paper outlines both the upside and downside to using both these services sepearte and together.
Posted: 11 May 2011 | Published: 11 May 2011

Novell, Inc.

Novell Sentinel: Active Event Monitoring for Improved Security and Compliance Management
sponsored by Novell, Inc.
WHITE PAPER: Novell Sentinel represents a turning point for enterprises. Costly, time-consuming, error-prone manual processes can now be replaced with an automated, rigorous and predictable security- and compliance monitoring program.
Posted: 11 May 2011 | Published: 11 May 2011

Novell, Inc.

Simplify Compliance and Security with Novell® SentinelT Log Manager
sponsored by Novell, Inc.
WHITE PAPER: Finding a log management solution that can manage risk, simplify regulatory compliance and provide security for you network can be very difficult. There are many systems that contain some of these tools but now there is a system that can do all of this.
Posted: 11 May 2011 | Published: 11 May 2011

Novell, Inc.

NYC HHS
sponsored by Novell, Inc.
CASE STUDY: When New York City Health and Human Services was looking for a new log management solutions that would provide them with security for their sensitive information and make it easier to comply to state, federal, and industry regulations they did not expect to find a system that would do all that and more.
Posted: 11 May 2011 | Published: 11 May 2011

Novell, Inc.

Log Management Best Practices: Six Tips for Success
sponsored by Novell, Inc.
EGUIDE: The right log management tool can go a long way toward reducing the burden of managing enterprise system log data. However, the righ tool can quickly become the wrong tool unless an organization invests the time and effort required to make the most of it. Diana Kelley offers six log management best practices to ensure a successful implementation.
Posted: 11 Mar 2011 | Published: 11 Mar 2011

Novell, Inc.

The Complete Guide to Log and Event Management
sponsored by Novell, Inc.
WHITE PAPER: This paper analyzes the relationship between SIEM and log management - focusing not only on the technical differences and different uses for these technologies, but also on architecting their joint deployments.
Posted: 07 Mar 2011 | Published: 07 Mar 2011

Novell, Inc.

Simplify Compliance and Security with Novell® Sentinel™ Log Manager
sponsored by Novell, Inc.
WHITE PAPER: Novell Sentinel Log Manager is delivered as an all-inclusive software appliance that enables organizations to improve IT enterprise security and simplify regulatory compliance in a cost-effective and easy way. Novell Sentinel Log Manager cuts through deployment and management cost and complexity with the expensive proprietary hardware.
Posted: 07 Mar 2011 | Published: 07 Mar 2011

Novell, Inc.

Webinar: Addressing ‘The Unlucky Seven’ - Security and Compliance Issues that Matter Most to the Mid-Market
sponsored by ArcSight, an HP Company
WEBCAST: This webinar will go through the most critical challenges faced by mid-market companies, and illustrate how collecting and analyzing event data across the enterprise can address those challenges in the context of budget and staff constraints.
Posted: 04 Mar 2011 | Premiered: Mar 4, 2011

ArcSight, an HP Company

ArcSight Logger: Universal Log Management Solution
sponsored by ArcSight, an HP Company
PRODUCT OVERVIEW: ArcSight Logger is a universal log management solution that unifies searching, reporting, alerting and analysis across any type of enterprise log data - making it unique in its ability to collect, analyze and store massive amounts of data generated by modern networks. Check out this product brief to learn more.
Posted: 04 Mar 2011 | Published: 04 Mar 2011

ArcSight, an HP Company

Granular application control, intelligence and real-time visualization
sponsored by SonicWALL
WHITE PAPER: It can be a real challenge for IT administrators to efficiently deliver critical corporate solutions while also contending with employee use of wasteful and often dangerous applications. Critical applications need bandwidth prioritization while social media and gaming applications need to be bandwidth throttled or completely blocked.
Posted: 28 Feb 2011 | Published: 28 Feb 2011

SonicWALL

Protect, Detect, and Correct: What's New in Tripwire Enterprise 8
sponsored by Tripwire, Inc.
DATA SHEET: Configurations that "drift" from compliance, by the accrual of gradual, sometimes minute changes often lead to exploits, audit failures, and unplanned repair time. Worse still, it takes even more time to bring new, fresh, out-of-the-box servers up to a compliant, audit-passing state—sometimes a half a day or more per machine.
Posted: 24 Feb 2011 | Published: 24 Feb 2011

Tripwire, Inc.

Tripwire Enterprise and Tripwire Log Center: Integrated for Unparalleled Security
sponsored by Tripwire, Inc.
DATA SHEET: Tools for monitoring and protecting the IT infrastructure have evolved into powerful, yet isolated, islands of defense. Because modern threats can take advantage of this isolation, IT security needs a single, comprehensive view of infrastructure security.
Posted: 24 Feb 2011 | Published: 24 Feb 2011

Tripwire, Inc.
76 - 100 of 133 Matches Previous Page    2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement