IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Log Management

RSS Feed   
ALSO CALLED: Security Event Log Monitoring
DEFINITION: The collection, storage, and reporting of log data from firewalls, routers, servers, applications, operating systems and devices in near real-time for compliance and risk mitigation.
Log Management Reports
1 - 25 of 97 Matches Previous Page  |  Next Page
Logging Without Limits
sponsored by Datadog
WHITE PAPER: Unplanned outages, production fixes and new deployments lead to substantial variations in log volume and cost—and traditional log management strategies can’t keep up. In this report, DataDog suggest a different path: their Log Management solution unifies metrics, traces, and logs, so that you don’t have to sacrifice log coverage to save costs.
Posted: 04 Aug 2020 | Published: 04 Aug 2020

TOPICS:  Log Management
Datadog

Log Monitoring Improvements Can Reign in Data Costs
sponsored by Beta Systems
EGUIDE: As cloud-native applications steadily become the norm, log management responsibilities have started to pile up. Download this E-Guide to learn how to add new capabilities to your existing log monitoring toolkits – all in the name of keeping pace with explosive data growth and keeping runaway cloud costs at bay.
Posted: 16 Jun 2020 | Published: 16 Jun 2020

TOPICS:  Log Management
Beta Systems

How to keep application logs from being lost in translation
sponsored by Beta Systems
EGUIDE: Download this E-Guide from SearchITOperation.com to find out how to harness application log management tools and guidelines to successfully interpret application log data and generate meaningful insights.
Posted: 12 Jun 2020 | Published: 12 Jun 2020

Beta Systems

Migrating Log Analytics to the Cloud
sponsored by Cribl.io
WHITE PAPER: Log analytics have emerged as a powerful tool, allowing you to understand your data systems in ways that weren’t possible before. But these SaaS solutions often incur massive data costs due to unregulated and unnecessary data streaming. Check out this white paper to learn how an observability pipeline can help you overcome this issue.
Posted: 11 Jun 2020 | Published: 11 Jun 2020

Cribl.io

6 Techniques to Control Runaway Log Volume
sponsored by Cribl.io
WHITE PAPER: Log analytics system costs can get expensive during high volume periods. But with a bit of elbow grease, admins can usually trim ingestion rates by a dramatic margin – sometimes by as much as 50%. Inside, learn 6 tips on how to control log volume data.
Posted: 10 Jun 2020 | Published: 10 Jun 2020

Cribl.io

Balance the power and challenges of IT monitoring
sponsored by SearchITOperations
EBOOK: IT monitoring tools deliver plenty of data, but sometimes, the volume can be a problem. It's a challenge to know how closely to monitor infrastructure and applications, especially when some tools monitor apps in real time.
Posted: 29 May 2020 | Published: 29 May 2020


Infrastructure-Wide Log Management
sponsored by Beta Systems
EGUIDE: As enterprise IT environments grow continuously more complex, its easy for critical system information to slip between the cracks. Dive inside this expert E-Guide to learn about the emerging, infrastructure-wide log management platforms designed to combat this very problem.
Posted: 27 Mar 2020 | Published: 27 Mar 2020

TOPICS:  Log Management
Beta Systems

Three Log Analytics Use Cases
sponsored by Beta Systems
EGUIDE: Download this E-Guide to uncover three log analytics use cases that detail scenarios like incident fixes, trends discovery, and IT optimization.
Posted: 06 Feb 2020 | Published: 06 Feb 2020

TOPICS:  Log Management
Beta Systems

Making the 24/7 Customer Experience Possible Through Monitoring
sponsored by SolarWinds, Inc.
CASE STUDY: Traxo was struggling to handle all of their customer service responsibilities in a streamlined way and turned to SolarWinds to manage their multiple needs.
Posted: 25 Nov 2019 | Published: 25 Nov 2019

SolarWinds, Inc.

Get Real Time Threat Detection Starting on Day 1 with AlienVault USM
sponsored by AT&T Cybersecurity
TRIAL SOFTWARE: Save time by drilling down threat details into one console and defending against today's threats with all of the essential security tools you need. Test drive the AlienVault USM with a 30-day free download trail today.
Posted: 08 Apr 2015 | Premiered: 08 Apr 2015

AT&T Cybersecurity

A Guide to SIEM Platforms, Benefits and Features
sponsored by SearchSecurity.com
EZINE: SIEM systems enable organizations to centralize indecent response, detection and handling, as well as data logging for compliance. This e-guide is a collection of resources highlighting SIEM benefits, criteria and tools. Read on to evaluate which SIEM system is right for you.
Posted: 09 Jan 2020 | Published: 09 Jan 2020

SearchSecurity.com

User behavior analytics tackles cloud, hybrid environments
sponsored by SearchSecurity.com
EZINE: In this issue of Information Security, explore why organizations are investing in user behavior analytics for on-premises and cloud.
Posted: 28 Sep 2018 | Published: 28 Sep 2018

SearchSecurity.com

Security data scientists on how to make your data useful
sponsored by SearchSecurity.com
EZINE: In this issue of Information Security magazine, CISOs and security data scientists offer strategies for effective use of data analytics and machine learning to advance enterprise threat research.
Posted: 03 Aug 2018 | Published: 03 Aug 2018

SearchSecurity.com

A Computer Weekly buyer's guide to log management
sponsored by ComputerWeekly.com
EBOOK: In this 13-page buyer's guide, Computer Weekly looks at how companies analyse server and security logs to tackle cybercrime and internal fraud;how application log management provides insight into application behaviour, which can be used to build better software;and how network administrators can use data from log files to automate security systems.
Posted: 19 Aug 2015 | Published: 19 Aug 2015

ComputerWeekly.com

Computer Weekly – 21 July 2015: How the internet of things could save the honeybee
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, with bee populations being decimated, we find out how the internet of things could save the honeybee. Amid fears that artificial intelligence could end human innovation, we hear from the experts on AI about the reality. And we examine the challenges of customer service in a multi-channel world. Read the issue now.
Posted: 17 Jul 2015 | Published: 17 Jul 2015

ComputerWeekly.com

Computer Weekly July 2015: The Most Influential Women in UK IT
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we reveal our annual list of the 50 most influential women in UK IT – and talk to this year's winner, Citrix vice president Jacqueline de Rojas. Also, we look at how ARM chips are making inroads into the data centre as energy awareness becomes a growing corporate IT issue.
Posted: 10 Jul 2015 | Published: 10 Jul 2015

ComputerWeekly.com

Computer Weekly – 7 July 2015: The IT behind Angry Birds
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the CIO of Rovio Entertainment, the company behind the gaming phenomenon Angry Birds, about how he supports a global business with a five-person IT team. We assess your options for moving off Windows Server 2003 now support is ending. And our buyer's guide looks at log management. Read the issue now.
Posted: 06 Jul 2015 | Published: 06 Jul 2015

ComputerWeekly.com

Modern Infrastructure – November/December 2014
sponsored by SearchDataCenter.com
EZINE: As cloud computing, consumerization and virtualization trends converge, IT departments have been forced to re-think their strategy and tactics. Modern Infrastructure explores the impact of these shifts on data center infrastructure and guides IT managers in their decision making.
Posted: 02 Dec 2014 | Published: 02 Dec 2014

SearchDataCenter.com

Extending Security Intelligence with Big Data
sponsored by IBM
WHITE PAPER: Learn how IBM Security Intelligence with Big Data can help organizations gain insights into advanced data threats.
Posted: 08 Oct 2014 | Published: 31 Jan 2013

IBM

Top 5 Truths About Big Data Hype and Security Intelligence
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This resource outlines the top five truths behind the Big Data hype and explains why Big Data Security Analytics (BDSA) is the future of security intelligence. Read on to learn how it offers the insight you need to perform real-time threat detection and defense.
Posted: 19 Aug 2014 | Published: 05 Sep 2013

Hewlett Packard Enterprise

Countering Cyber-Crime with a Sharp Eye and a Clear Plan
sponsored by SearchSecurity.com
EBOOK: Bigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.
Posted: 14 Aug 2014 | Published: 21 Aug 2014

SearchSecurity.com

Top Tips for Collecting, Storing, and Analyzing Operations Log Data
sponsored by Hewlett Packard Enterprise
WEBCAST: View this webcast to learn about an operations log intelligence program that enables you to easily collect, centralize, archive and search your log files. Watch now for a brief demonstration of this software and explore the many benefits it can offer your organization.
Posted: 09 Jun 2014 | Premiered: Jun 9, 2014

Hewlett Packard Enterprise

Lake Health Enhances Patient Experience with HP ArcSight
sponsored by Hewlett Packard Enterprise
CASE STUDY: Uncover the SIEM a healthcare provider put in place which helped them take a proactive approach to information security, mitigate anomalies, increase visibility, ensure regulatory compliance, and more!
Posted: 05 Jun 2014 | Published: 31 Jan 2014

Hewlett Packard Enterprise

How to Protect the Increasingly Vulnerable Energy Industry
sponsored by IBM
WHITE PAPER: Learn how an integrated security intelligence platform provides the necessary components to help energy and utilities companies automate compliance and risk management, detect and manage threats, and protect the smart grid from both security breaches and cyber-attacks.
Posted: 24 Mar 2014 | Published: 31 Jul 2013

IBM

Leverage Security Intelligence for Government Agencies
sponsored by IBM
WHITE PAPER: This resource features a security intelligence platform that's paired with data analytics to help prevent, defend, remediate, and analyze more security incidents and policy violations than traditional information security systems.
Posted: 05 Mar 2014 | Published: 31 Mar 2013

IBM
1 - 25 of 97 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info