Log Management White Papers

(View All Report Types)
Extending Security Intelligence with Big Data
sponsored by IBM
WHITE PAPER: Learn how IBM Security Intelligence with Big Data can help organizations gain insights into advanced data threats.
Posted: 08 Oct 2014 | Published: 31 Jan 2013

IBM

Top 5 Truths About Big Data Hype and Security Intelligence
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This resource outlines the top five truths behind the Big Data hype and explains why Big Data Security Analytics (BDSA) is the future of security intelligence. Read on to learn how it offers the insight you need to perform real-time threat detection and defense.
Posted: 19 Aug 2014 | Published: 05 Sep 2013

Hewlett Packard Enterprise

How to Protect the Increasingly Vulnerable Energy Industry
sponsored by IBM
WHITE PAPER: Learn how an integrated security intelligence platform provides the necessary components to help energy and utilities companies automate compliance and risk management, detect and manage threats, and protect the smart grid from both security breaches and cyber-attacks.
Posted: 24 Mar 2014 | Published: 31 Jul 2013

IBM

Leverage Security Intelligence for Government Agencies
sponsored by IBM
WHITE PAPER: This resource features a security intelligence platform that's paired with data analytics to help prevent, defend, remediate, and analyze more security incidents and policy violations than traditional information security systems.
Posted: 05 Mar 2014 | Published: 31 Mar 2013

IBM

Better Security Intelligence for the Finance Industry
sponsored by IBM
WHITE PAPER: A security intelligence platform is a key element for fighting the many threats the financial institution faces, and this white papers describes on such platform.
Posted: 19 Dec 2013 | Published: 31 Mar 2013

IBM

QRadar Risk Manager: Security Intelligence Keeps You Ahead of Threats
sponsored by IBM
WHITE PAPER: This white paper highlights an automated risk management solution that correlates information on asset vulnerabilities and device configurations to better predict risks before they occur.
Posted: 17 Dec 2013 | Published: 31 Jan 2013

IBM

Proactive data security, audit and compliance solutions
sponsored by IBM
WHITE PAPER: Access this white paper for key information about a data management solution that supports enterprises in their entirety, and ensures automated, integrated compliance and security across all platforms.
Posted: 16 Oct 2013 | Published: 30 Apr 2013

IBM

10 Tips to Help You Minimize the Duration and Impact of a Security Breach
sponsored by Dell SecureWorks
WHITE PAPER: Uncover the top 10 things you should do to enhance the security of your enterprise and reduce the duration and impact of a security breach.
Posted: 23 May 2013 | Published: 23 May 2013

Dell SecureWorks

Tripwire Log Center Product Brief
sponsored by Tripwire, Inc.
WHITE PAPER: Consult this informative white paper to learn how log management is helping to better identify threats and deploy security information and event management systems (SIEM). Learn how you can uncover suspicious activities and improve security by reading this asset now.
Posted: 02 Oct 2012 | Published: 02 Oct 2012

Tripwire, Inc.

Smart, Visible and Automated: The New Log Management
sponsored by Tripwire, Inc.
WHITE PAPER: View this informative white paper to learn more about moving to a more advanced risk protection policy. Improve your log management capabilities by implementing functionality with SIEM, file integrity monitoring and more!
Posted: 27 Sep 2012 | Published: 28 Sep 2012

Tripwire, Inc.

Continuous Monitoring: Responding to New Threats in More Complex IT Environments
sponsored by Tripwire, Inc.
WHITE PAPER: Governments today are focusing on the practice of continuous monitoring as a means to providing the much needed balance between data access and protection. In this paper, learn more about continuous monitoring, including what is it and why it’s needed, guidelines for implementing it, key capabilities of an effective solution, and more.
Posted: 24 Feb 2012 | Published: 24 Feb 2012

Tripwire, Inc.

Best Practices for Enhancing Microsoft Exchange Server 2010 Data Protection and Availability using Dell EqualLogic Snapshots
sponsored by DellEMC and Intel®
WHITE PAPER: IT leaders are challenged by the growth of the amount of data they have to manage. While data management encompasses several areas of an organization, ensuring the data protection and business continuity is one of the most critical aspects. Inside this white paper, uncover strategies for avoiding data loss and lack of application availability.
Posted: 02 Dec 2011 | Published: 02 Dec 2011

DellEMC and Intel®

HP ArcSight Express 3.0
sponsored by HP Enterprise Security.
WHITE PAPER: View this white paper to explore how to maintain the security of your corporate IT assets by detecting more incidents and addressing larger set of log data with HP ArcSight SIEM solutions.
Posted: 28 Oct 2011 | Published: 28 Oct 2011

HP Enterprise Security.

The Complete Guide to Log and Event Management
sponsored by Novell, Inc.
WHITE PAPER: This white paper will provide you with the information you need to purchase an Event and Log Management soutions. This paper outlines both the upside and downside to using both these services sepearte and together.
Posted: 11 May 2011 | Published: 11 May 2011

Novell, Inc.

Novell Sentinel: Active Event Monitoring for Improved Security and Compliance Management
sponsored by Novell, Inc.
WHITE PAPER: Novell Sentinel represents a turning point for enterprises. Costly, time-consuming, error-prone manual processes can now be replaced with an automated, rigorous and predictable security- and compliance monitoring program.
Posted: 11 May 2011 | Published: 11 May 2011

Novell, Inc.

Simplify Compliance and Security with Novell® SentinelT Log Manager
sponsored by Novell, Inc.
WHITE PAPER: Finding a log management solution that can manage risk, simplify regulatory compliance and provide security for you network can be very difficult. There are many systems that contain some of these tools but now there is a system that can do all of this.
Posted: 11 May 2011 | Published: 11 May 2011

Novell, Inc.

The Complete Guide to Log and Event Management
sponsored by Novell, Inc.
WHITE PAPER: This paper analyzes the relationship between SIEM and log management - focusing not only on the technical differences and different uses for these technologies, but also on architecting their joint deployments.
Posted: 07 Mar 2011 | Published: 07 Mar 2011

Novell, Inc.

Simplify Compliance and Security with Novell® Sentinel™ Log Manager
sponsored by Novell, Inc.
WHITE PAPER: Novell Sentinel Log Manager is delivered as an all-inclusive software appliance that enables organizations to improve IT enterprise security and simplify regulatory compliance in a cost-effective and easy way. Novell Sentinel Log Manager cuts through deployment and management cost and complexity with the expensive proprietary hardware.
Posted: 07 Mar 2011 | Published: 07 Mar 2011

Novell, Inc.

Granular application control, intelligence and real-time visualization
sponsored by SonicWALL
WHITE PAPER: It can be a real challenge for IT administrators to efficiently deliver critical corporate solutions while also contending with employee use of wasteful and often dangerous applications. Critical applications need bandwidth prioritization while social media and gaming applications need to be bandwidth throttled or completely blocked.
Posted: 28 Feb 2011 | Published: 28 Feb 2011

SonicWALL

Tripwire Log Center
sponsored by Tripwire, Inc.
WHITE PAPER: A decade or more ago, logs of events recorded by firewalls, intrusion detection systems and other network devices were considered more of a nuisance than a help. There were too many of them, they weren’t easily collected, and there was no easy way to make sense of which were important.
Posted: 08 Feb 2011 | Published: 08 Feb 2011

Tripwire, Inc.

A Pragmatic Approach to SIEM
sponsored by Tripwire, Inc.
WHITE PAPER: In this paper we will take a look at this disturbing trend and provide useful guidance for maximizing the value of SIEM and log management tools, while focusing on protecting systems and data not on simply checking the compliance check box.
Posted: 08 Feb 2011 | Published: 08 Feb 2011

Tripwire, Inc.

Protection Starts with Security Management Solutions from Novell
sponsored by Novell, Inc.
WHITE PAPER: Enterprises are under constant attack from internal and external threats. Repelling today’s threats requires a new approach to security—an approach that emphasizes centralized log management and security event management. Novell makes it simple to get on the path to better security with our Security Management solutions.
Posted: 28 Jul 2010 | Published: 28 Jul 2010

Novell, Inc.

Sentinel Log Manager Review
sponsored by Novell, Inc.
WHITE PAPER: This paper is a review of the stand-alone Sentinel Log Manager and how it stands up to keyconcerns that survey respondents raised about log managers, including collection, storage andsearching/reporting capabilities.
Posted: 28 Jul 2010 | Published: 28 Jul 2010

Novell, Inc.

Secure, Simple and Powerful Log Management with Novell® Sentinel™ Log Manager
sponsored by Novell, Inc.
WHITE PAPER: Read this whitepaper to find out how Novell's Sentinel™ Log Management solution simplifies compliance by collecting, storing, analyzing and managing data logs from all across your enterprise.
Posted: 09 Dec 2009 | Published: 08 Dec 2009

Novell, Inc.

Novell® Sentinel™ Log Manager: Secure, Simple and Powerful Log Management
sponsored by Novell, Inc.
WHITE PAPER: Learn how Novell's Sentinel Log Manager allows organizations to simplify their compliance efforts, reduce deployment and management costs, and build a scalable compliance and security foundation that grows with their needs.
Posted: 09 Dec 2009 | Published: 08 Mar 2011

Novell, Inc.