All resources sponsored by:

Graylog

9 Matches
Go From Reactive to Fully Proactive With Graylog
sponsored by Graylog
WEBCAST:Uncover the value of log management and find out how you can move your log management approach from reactive to proactive across this 3-webinars series. In this first webinar, join Jeff Darrington, Senior Technical Marketing Manager, at Graylog as he discusses alerts and notifications and how to use them effectively.
Posted: 17 Aug 2021 | Premiered: Aug 17, 2021
Get This Now

TOPICS:  .NET

Ultimate guide to monitoring and logging requirements for compliance
sponsored by Graylog
EGUIDE:With this guide, gain insights to the top 5 important cybersecurity and privacy regulations, providing examples that showcase both the commonalities between and evolution of cybersecurity and privacy compliance. As well as, generalized monitoring and logging requirements.
Posted: 16 Aug 2021 | Published: 16 Aug 2021
Get This Now

TOPICS:  .NET

4 steps to planning a successful data breach incident response
sponsored by Graylog
EBOOK:This step-by-step guide takes you through the journey to preparing your centralized log management for critical incident response. Access this e-book to get started.
Posted: 13 Aug 2021 | Published: 13 Aug 2021
Get This Now

TOPICS:  .NET

Automating security operations
sponsored by Graylog
WHITE PAPER:Automation can dramatically improve security speed, reducing average time to respond to most threats from 30 mins to 5 mins – that’s more than 80% of time saved. Access the white paper to fully understand how automation dramatically improves accuracy and can help your team do more with the resources they have.
Posted: 13 Aug 2021 | Published: 13 Aug 2021
Get This Now

TOPICS:  .NET

5 key questions to optimizing security log management
sponsored by Graylog
WHITE PAPER:While most security experts agree that event log data provides much-needed visibility into the threats facing your environment, many lack the time to collect, manage and correlate log data. Read this white paper to learn more about implementing centralized log management, including 5 key questions to ask to optimize security log management.
Posted: 12 Aug 2021 | Published: 12 Aug 2021
Get This Now

TOPICS:  Cybersecurity

Optimizing SIEM with log management
sponsored by Graylog
EBOOK:Security Information and Event Management (SIEM) is typically centered around alerts – but when those alerts go unheeded or don’t offer mitigation steps, SIEM can become expensive and ineffective. Access this e-book to explore how to make the most of SIEM with log management tools that enhance capabilities and strengthen security.
Posted: 12 Aug 2021 | Published: 12 Aug 2021
Get This Now


Threat intelligence integration: from source to secure
sponsored by Graylog
EGUIDE:In this guide, you’ll learn what you stand to gain through the use and integration of threat intelligence, what to consider when selecting a source of threat intelligence, and how to make threat intelligence work for your organization. Access the document to learn more.
Posted: 11 Aug 2021 | Published: 11 Aug 2021
Get This Now

TOPICS:  .NET

Mega breaches: security best practices and log management
sponsored by Graylog
TRANSCRIPT:In this interview, join Nick Carstensen, technical product evangelist at Graylog, and Information Security Media Group’s Nick Holland to discuss the lesson learned in the Capital One data breach.
Posted: 11 Aug 2021 | Published: 11 Aug 2021
Get This Now

TOPICS:  .NET

Crawl, walk, run: a growth-oriented approach to maximizing SIEM deployment
sponsored by Graylog
WHITE PAPER:With this white paper, explore each of the three stages of SIEM growth and focus on the continuous evolution of the 4 elements in an organization’s security ecosystem: sources, skillsets, knowledge, and tools. Access the white paper to learn more.
Posted: 10 Aug 2021 | Published: 10 Aug 2021
Get This Now

TOPICS:  .NET

9 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences