All resources sponsored by:

One Identity

13 Matches
Log Management Essentials
sponsored by One Identity
WHITE PAPER:In IT environments, a wide variety of sources generate log messages in many different formats. Whether you are trying to enhance security, improve operations or meet compliance objectives, log data contains valuable information and harnessing that data is critical. In this white paper, learn how to properly implement log management.
Posted: 18 Mar 2019 | Published: 18 Mar 2019
Get This Now


How to Forward Log Messages to Splunk From syslog-ng
sponsored by One Identity
WHITE PAPER:Splunk is a popular search and analysis platform. Many users of Splunk have also deployed syslog-ng in their environments to help with tasks like collecting and centralizing log messages from network devices. In this white paper, learn about 5 use cases for syslog-ng and how to get them started.
Posted: 18 Mar 2019 | Published: 18 Mar 2019
Get This Now


NIST Cybersecurity Framework
sponsored by One Identity
WHITE PAPER:This white paper provides an overview of the NIST Cybersecurity framework, an internationally widespread collection of best practices on how organizations should develop and upgrade their IT security infrastructure.
Posted: 18 Mar 2019 | Published: 18 Mar 2019
Get This Now


Storing Logs in Elasticsearch Using Syslog-ng
sponsored by One Identity
WHITE PAPER:Elasticsearch is a scalable, searchable NoSQL DB that boasts a main appeal of syslog-ng capabilities (a high-performance log collector that works with data coming from a wide variety of sources). Read this white paper to learn more about Elasticsearch and why you may want it to process your logs.
Posted: 15 Mar 2019 | Published: 31 Dec 2018
Get This Now


Logging in Docker using syslog-ng
sponsored by One Identity
WHITE PAPER:There are many use cases for containers, but have you considered containerization of your central log server? In this whitepaper, find a demonstration for containerizing your event logging, and learn why Docker is the go-to choice for central log servers.
Posted: 15 Mar 2019 | Published: 31 Dec 2018
Get This Now

TOPICS:  Log Management

Optimizing SIEM
sponsored by One Identity
WHITE PAPER:SIEM solutions form the core of many enterprises' IT Security strategy but they can be expensive to deploy and maintain. Optimizing your SIEM solution can reduce costs and improve performance. In this white paper, learn about the challenges, solutions and benefits of optimizing your SIEM solution.
Posted: 15 Mar 2019 | Published: 15 Mar 2019
Get This Now


Message Classification with syslog-ng
sponsored by One Identity
WHITE PAPER:Log messages can be used to detect security incidents, operational problems, policy violations, and are useful in auditing and forensics situations. Read this white paper to find out how system logging can help ease the burden of system administrators and see how you can simplify your logging architecture with syslog-ng.
Posted: 14 Mar 2019 | Published: 14 Mar 2019
Get This Now


Azure Active Directory vs. Classic AD
sponsored by One Identity
ESSENTIAL GUIDE:Jump into this E-Guide to find out how to pinpoint the differences between the Microsoft Azure edition of Active Directory and the classic Windows Active Directory – and how to use those differences to your enterprise's advantage.
Posted: 13 Mar 2019 | Published: 11 Mar 2019
Get This Now


Easy Active Directory Clean-Up Tips
sponsored by One Identity
ESSENTIAL GUIDE:Inside this E-Guide, read through some Active Directory organization strategies designed to minimize the headaches that often accompany user group restructuring projects – and ultimately reduce the time spent sifting through messy group architectures.
Posted: 13 Mar 2019 | Published: 11 Mar 2019
Get This Now


Go Back to the Basics with Active Directory
sponsored by One Identity
ESSENTIAL GUIDE:Despite your level of familiarity, it never hurts to keep up-to-date on basic Active Directory best practices. Inside this E-Guide, brush up on some basic Active Directory tips and tricks around domain controllers, cloud AD interactions, and more.
Posted: 12 Mar 2019 | Published: 11 Mar 2019
Get This Now


How Can Privileged Access Accounts Be Managed in Large Companies?
sponsored by One Identity
EGUIDE:According to a Verizon Data Breach Report, 55% of insider misuse incidents involved access abuse. Inside this e-guide, security expert Michael Cobb, dives into the risk of privileged access and reveals best practices for securing privileged access.
Posted: 20 Nov 2017 | Published: 13 Nov 2017
Get This Now


How can organizations get control over privileged identity management?
sponsored by One Identity
EGUIDE:Recent research showed 72% of temporary workers and contractors are given administrative privileges on their employers' systems. Explore this expert e-guide to learn how you can improve the security of privileged access by minimizing exposure of sensitive activities and information
Posted: 20 Nov 2017 | Published: 14 Nov 2017
Get This Now


IAM for the Real World – Privileged Account Management
sponsored by One Identity
WHITE PAPER:Read this e-book for essential information on common security issues with privileged account management (PAM) – and how you can minimize or eliminate them.
Posted: 27 Feb 2014 | Published: 31 Dec 2012
Get This Now


13 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement