IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Log Management

RSS Feed   
ALSO CALLED: Security Event Log Monitoring
DEFINITION: The collection, storage, and reporting of log data from firewalls, routers, servers, applications, operating systems and devices in near real-time for compliance and risk mitigation.
Log Management Reports
1 - 25 of 92 Matches Previous Page  |  Next Page
How to Forward Log Messages to Splunk From syslog-ng
sponsored by One Identity
WHITE PAPER: Splunk is a popular search and analysis platform. Many users of Splunk have also deployed syslog-ng in their environments to help with tasks like collecting and centralizing log messages from network devices. In this white paper, learn about 5 use cases for syslog-ng and how to get them started.
Posted: 18 Mar 2019 | Published: 18 Mar 2019

One Identity

Logging in Docker using syslog-ng
sponsored by One Identity
WHITE PAPER: There are many use cases for containers, but have you considered containerization of your central log server? In this whitepaper, find a demonstration for containerizing your event logging, and learn why Docker is the go-to choice for central log servers.
Posted: 15 Mar 2019 | Published: 31 Dec 2018

TOPICS:  Log Management
One Identity

Message Classification with syslog-ng
sponsored by One Identity
WHITE PAPER: Log messages can be used to detect security incidents, operational problems, policy violations, and are useful in auditing and forensics situations. Read this white paper to find out how system logging can help ease the burden of system administrators and see how you can simplify your logging architecture with syslog-ng.
Posted: 14 Mar 2019 | Published: 14 Mar 2019

One Identity

Tuning Your Log Volume
sponsored by Corelight
WHITE PAPER: In this white paper, learn how filtering can help reduce log volume and make it more manageable and useful—rather than letting it unintentionally fill up disks or drive up SIEM costs.
Posted: 31 Jan 2019 | Published: 31 Jan 2019

Corelight

SIEM guide: Key insights, features, and use cases
sponsored by TechTarget
RESOURCE: SIEM + Machine Learning: Understand advanced SIEM features and which would be most beneficial to your organization with this guide. Add your valuable security insights to our market research survey to access your SIEM features and benefits guide!
Posted: 30 Jul 2018 | Published: 02 Oct 2018

TOPICS:  Log Management
TechTarget

CW500: Best practice in BYOD
sponsored by ComputerWeekly.com
PRESENTATION: Simon Furber, Network Manager at Brunel University, highlights the key issues to consider when introducing BYOD in your organisation.
Posted: 06 Sep 2013 | Published: 06 Sep 2013

ComputerWeekly.com

User behavior analytics tackles cloud, hybrid environments
sponsored by SearchSecurity.com
EZINE: In this issue of Information Security, explore why organizations are investing in user behavior analytics for on-premises and cloud.
Posted: 28 Sep 2018 | Published: 28 Sep 2018

SearchSecurity.com

Security data scientists on how to make your data useful
sponsored by SearchSecurity.com
EZINE: In this issue of Information Security magazine, CISOs and security data scientists offer strategies for effective use of data analytics and machine learning to advance enterprise threat research.
Posted: 03 Aug 2018 | Published: 03 Aug 2018

SearchSecurity.com

A Computer Weekly buyer's guide to log management
sponsored by ComputerWeekly.com
EBOOK: In this 13-page buyer's guide, Computer Weekly looks at how companies analyse server and security logs to tackle cybercrime and internal fraud;how application log management provides insight into application behaviour, which can be used to build better software;and how network administrators can use data from log files to automate security systems.
Posted: 19 Aug 2015 | Published: 19 Aug 2015

ComputerWeekly.com

Computer Weekly – 21 July 2015: How the internet of things could save the honeybee
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, with bee populations being decimated, we find out how the internet of things could save the honeybee. Amid fears that artificial intelligence could end human innovation, we hear from the experts on AI about the reality. And we examine the challenges of customer service in a multi-channel world. Read the issue now.
Posted: 17 Jul 2015 | Published: 17 Jul 2015

ComputerWeekly.com

Computer Weekly July 2015: The Most Influential Women in UK IT
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we reveal our annual list of the 50 most influential women in UK IT – and talk to this year's winner, Citrix vice president Jacqueline de Rojas. Also, we look at how ARM chips are making inroads into the data centre as energy awareness becomes a growing corporate IT issue.
Posted: 10 Jul 2015 | Published: 10 Jul 2015

ComputerWeekly.com

Computer Weekly – 7 July 2015: The IT behind Angry Birds
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the CIO of Rovio Entertainment, the company behind the gaming phenomenon Angry Birds, about how he supports a global business with a five-person IT team. We assess your options for moving off Windows Server 2003 now support is ending. And our buyer's guide looks at log management. Read the issue now.
Posted: 06 Jul 2015 | Published: 06 Jul 2015

ComputerWeekly.com

Modern Infrastructure – November/December 2014
sponsored by SearchDataCenter.com
EZINE: As cloud computing, consumerization and virtualization trends converge, IT departments have been forced to re-think their strategy and tactics. Modern Infrastructure explores the impact of these shifts on data center infrastructure and guides IT managers in their decision making.
Posted: 02 Dec 2014 | Published: 02 Dec 2014

SearchDataCenter.com

Extending Security Intelligence with Big Data
sponsored by IBM
WHITE PAPER: Learn how IBM Security Intelligence with Big Data can help organizations gain insights into advanced data threats.
Posted: 08 Oct 2014 | Published: 31 Jan 2013

IBM

Top 5 Truths About Big Data Hype and Security Intelligence
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This resource outlines the top five truths behind the Big Data hype and explains why Big Data Security Analytics (BDSA) is the future of security intelligence. Read on to learn how it offers the insight you need to perform real-time threat detection and defense.
Posted: 19 Aug 2014 | Published: 05 Sep 2013

Hewlett Packard Enterprise

Countering Cyber-Crime with a Sharp Eye and a Clear Plan
sponsored by SearchSecurity.com
EBOOK: Bigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.
Posted: 14 Aug 2014 | Published: 21 Aug 2014

SearchSecurity.com

Top Tips for Collecting, Storing, and Analyzing Operations Log Data
sponsored by Hewlett Packard Enterprise
WEBCAST: View this webcast to learn about an operations log intelligence program that enables you to easily collect, centralize, archive and search your log files. Watch now for a brief demonstration of this software and explore the many benefits it can offer your organization.
Posted: 09 Jun 2014 | Premiered: Jun 9, 2014

Hewlett Packard Enterprise

Lake Health Enhances Patient Experience with HP ArcSight
sponsored by Hewlett Packard Enterprise
CASE STUDY: Uncover the SIEM a healthcare provider put in place which helped them take a proactive approach to information security, mitigate anomalies, increase visibility, ensure regulatory compliance, and more!
Posted: 05 Jun 2014 | Published: 31 Jan 2014

Hewlett Packard Enterprise

How to Protect the Increasingly Vulnerable Energy Industry
sponsored by IBM
WHITE PAPER: Learn how an integrated security intelligence platform provides the necessary components to help energy and utilities companies automate compliance and risk management, detect and manage threats, and protect the smart grid from both security breaches and cyber-attacks.
Posted: 24 Mar 2014 | Published: 31 Jul 2013

IBM

Leverage Security Intelligence for Government Agencies
sponsored by IBM
WHITE PAPER: This resource features a security intelligence platform that's paired with data analytics to help prevent, defend, remediate, and analyze more security incidents and policy violations than traditional information security systems.
Posted: 05 Mar 2014 | Published: 31 Mar 2013

IBM

Better Security Intelligence for the Finance Industry
sponsored by IBM
WHITE PAPER: A security intelligence platform is a key element for fighting the many threats the financial institution faces, and this white papers describes on such platform.
Posted: 19 Dec 2013 | Published: 31 Mar 2013

IBM

QRadar Risk Manager: Security Intelligence Keeps You Ahead of Threats
sponsored by IBM
WHITE PAPER: This white paper highlights an automated risk management solution that correlates information on asset vulnerabilities and device configurations to better predict risks before they occur.
Posted: 17 Dec 2013 | Published: 31 Jan 2013

IBM

Proactive data security, audit and compliance solutions
sponsored by IBM
WHITE PAPER: Access this white paper for key information about a data management solution that supports enterprises in their entirety, and ensures automated, integrated compliance and security across all platforms.
Posted: 16 Oct 2013 | Published: 30 Apr 2013

IBM

CARA Meets PCI Requirements and Gains Network Visibility: A Case Study
sponsored by LogRhythm, Inc.
CASE STUDY: This case study reveals which solution CARA, a network of 700+ restaurants across Canada, put in place to simplify their PCI compliance and audit processes and improve their security posture. View now to learn more!
Posted: 04 Sep 2013 | Published: 31 May 2013

LogRhythm, Inc.

Strategies to Maintain PCI DSS Compliance
sponsored by GeoTrust, Inc.
EGUIDE: This e-guide outlines strategies for streamlining key PCI DSS processes to ensure that comprehensive compliance is achieved efficiently – for maximum business benefit.
Posted: 23 Jul 2013 | Published: 23 Jul 2013

GeoTrust, Inc.
1 - 25 of 92 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement