Vertical Industries  >  

Logging industry

RSS Feed   
Logging industry Reports
 
Sun World International: A case study in smarter planet leadership
sponsored by IBM
CASE STUDY: This case study illustrates how Sun World International, a mid-sized grower in California, shifted its competitive strategy to capitalize on analytics and gain real-time insight into the competitive market. Learn how it gained a 5% reduction in harvesting costs, a 20% reduction in fuel usage and an eight-fold increase in profit per acre.
Posted: 22 May 2012 | Published: 22 May 2012

IBM

Computer Weekly – 20 March 2018: Where neuroscience meets technology
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how computer scientists are using data, cloud and virtual reality to understand the brain and improve mental wellbeing. We analyse newly published government documents detailing the early problems with Universal Credit. And we look at how AI can help improve cyber security. Read the issue now.
Posted: 16 Mar 2018 | Published: 16 Mar 2018

ComputerWeekly.com

Computer Weekly – 26 January 2021: 'Salad as a service' – how tech could revolutionise farming
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how new technologies are supporting the rise of vertical farming, and could revolutionise food supply chains. We examine one of the biggest trends in the cloud – serverless computing. And Brexit has not yet ended the debate about UK-EU data protection. Read the issue now.
Posted: 25 Jan 2021 | Published: 26 Jan 2021

ComputerWeekly.com

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

Logging without Limits
sponsored by Datadog
WHITE PAPER: Unplanned outages, production fixes and new deployments lead to substantial variations in log volume and cost—and traditional log management strategies can’t keep up. In this report, DataDog suggest a different path: their Log Management solution unifies metrics, traces, and logs, so that you don’t have to sacrifice log coverage to save costs.
Posted: 04 Aug 2020 | Published: 04 Aug 2020

TOPICS:  Log Management
Datadog

Effective Ways to Search Log Files
sponsored by SearchSecurity.com
EGUIDE: Security log analysis is essential for effective security and risk management. But with countless logs generated every day, searching log files can be a burdensome headache. In this e-guide, expert John Burke uncovers the best methods for thorough security log analysis with an evolutionary path that mixes old concepts with new ones.
Posted: 05 Apr 2012 | Published: 05 Apr 2012

SearchSecurity.com

Total Cost of Ownership to Build and Operate an ELK Stack
sponsored by ChaosSearch
WHITE PAPER: ELK (Elasticsearch, Logstash, and Kibana) stacks are commonly used by many IT organizations for log monitoring and analysis at scale. Unfortunately, these stacks are often plagued by hidden costs and commitments. Download this white paper to learn how you can estimate the total cost of ownership for an ELK stack over the course of 3 years.
Posted: 01 Mar 2021 | Published: 01 Mar 2021

ChaosSearch

Secure, Simple and Powerful Log Management with Novell® Sentinel™ Log Manager
sponsored by Novell, Inc.
WHITE PAPER: Read this whitepaper to find out how Novell's Sentinel™ Log Management solution simplifies compliance by collecting, storing, analyzing and managing data logs from all across your enterprise.
Posted: 09 Dec 2009 | Published: 08 Dec 2009

Novell, Inc.

A Scalable Security Data Platform
sponsored by ChaosSearch
WHITE PAPER: Read this white paper to learn how log analytics platforms like ChaosSearch can help you process huge amounts of log data, use this data to identify and act on threats, and deal with advanced security issues like advanced persistent threats.
Posted: 31 Mar 2021 | Published: 31 Mar 2021

ChaosSearch

Log Management Best Practices: Six Tips for Success
sponsored by SearchSecurity.com
EGUIDE: The right log management tool can go a long way toward reducing the burden of managing enterprise system log data. However, the righ tool can quickly become the wrong tool unless an organization invests the time and effort required to make the most of it. Diana Kelley offers six log management best practices to ensure a successful implementation.
Posted: 25 Aug 2011 | Published: 01 Aug 2011

TOPICS:  Log Management
SearchSecurity.com

Tripwire Log Center
sponsored by Tripwire, Inc.
WHITE PAPER: A decade or more ago, logs of events recorded by firewalls, intrusion detection systems and other network devices were considered more of a nuisance than a help. There were too many of them, they weren’t easily collected, and there was no easy way to make sense of which were important.
Posted: 08 Feb 2011 | Published: 08 Feb 2011

Tripwire, Inc.

The Complete Guide to Log and Event Management
sponsored by Novell, Inc.
WHITE PAPER: This paper analyzes the relationship between SIEM and log management - focusing not only on the technical differences and different uses for these technologies, but also on architecting their joint deployments.
Posted: 07 Mar 2011 | Published: 07 Mar 2011

Novell, Inc.

Better Security Intelligence for the Finance Industry
sponsored by IBM
WHITE PAPER: A security intelligence platform is a key element for fighting the many threats the financial institution faces, and this white papers describes on such platform.
Posted: 19 Dec 2013 | Published: 31 Mar 2013

IBM

A Decision Maker's Guide to Log Management
sponsored by HP Enterprise Security
EGUIDE: Often undervalued as a strategic weapon, log management tools can play a vital role in securing mission-critical data and assuring accountability. Inside this expert resource, learn what factors to consider when it’s time to get a handle on your logs.
Posted: 01 Nov 2011 | Published: 28 Oct 2011

HP Enterprise Security

How to Protect the Increasingly Vulnerable Energy Industry
sponsored by IBM
WHITE PAPER: Learn how an integrated security intelligence platform provides the necessary components to help energy and utilities companies automate compliance and risk management, detect and manage threats, and protect the smart grid from both security breaches and cyber-attacks.
Posted: 24 Mar 2014 | Published: 31 Jul 2013

IBM

A Computer Weekly buyer's guide to log management
sponsored by ComputerWeekly.com
EBOOK: In this 13-page buyer's guide, Computer Weekly looks at how companies analyse server and security logs to tackle cybercrime and internal fraud;how application log management provides insight into application behaviour, which can be used to build better software;and how network administrators can use data from log files to automate security systems.
Posted: 19 Aug 2015 | Published: 19 Aug 2015

ComputerWeekly.com

The Complete Guide to Log and Event Management
sponsored by Novell, Inc.
WHITE PAPER: This white paper will provide you with the information you need to purchase an Event and Log Management soutions. This paper outlines both the upside and downside to using both these services sepearte and together.
Posted: 11 May 2011 | Published: 11 May 2011

Novell, Inc.

Security data scientists on how to make your data useful
sponsored by SearchSecurity.com
EZINE: In this issue of Information Security magazine, CISOs and security data scientists offer strategies for effective use of data analytics and machine learning to advance enterprise threat research.
Posted: 03 Aug 2018 | Published: 03 Aug 2018

SearchSecurity.com

IT Decision Checklist: SIMs and Log Management
sponsored by LogLogic, Inc.
EGUIDE: In this paper, you'll learn that Security information management systems are effective platforms for the collection, analysis and storage of events from a broad range of systems and devices. We'll outline what you should look for to get the most relevant data from SIMs.
Posted: 05 Jan 2010 | Published: 05 Jan 2010

LogLogic, Inc.

Modern Infrastructure – November/December 2014
sponsored by SearchDataCenter.com
EZINE: As cloud computing, consumerization and virtualization trends converge, IT departments have been forced to re-think their strategy and tactics. Modern Infrastructure explores the impact of these shifts on data center infrastructure and guides IT managers in their decision making.
Posted: 02 Dec 2014 | Published: 02 Dec 2014

SearchDataCenter.com

Novell® Sentinel™ Log Manager: Secure, Simple and Powerful Log Management
sponsored by Novell, Inc.
WHITE PAPER: Learn how Novell's Sentinel Log Manager allows organizations to simplify their compliance efforts, reduce deployment and management costs, and build a scalable compliance and security foundation that grows with their needs.
Posted: 09 Dec 2009 | Published: 08 Mar 2011

Novell, Inc.

Sentinel Log Manager Review
sponsored by Novell, Inc.
WHITE PAPER: This paper is a review of the stand-alone Sentinel Log Manager and how it stands up to keyconcerns that survey respondents raised about log managers, including collection, storage andsearching/reporting capabilities.
Posted: 28 Jul 2010 | Published: 28 Jul 2010

Novell, Inc.

Log Management Best Practices: Six Tips for Success
sponsored by Novell, Inc.
EGUIDE: The right log management tool can go a long way toward reducing the burden of managing enterprise system log data. However, the righ tool can quickly become the wrong tool unless an organization invests the time and effort required to make the most of it. Diana Kelley offers six log management best practices to ensure a successful implementation.
Posted: 11 Mar 2011 | Published: 11 Mar 2011

Novell, Inc.

IBM Security Event and Log Management Service
sponsored by IBM
SERVICE LISTING: With Security Event and Log Management Service, you can assemble the collective mindshare of your organization's network applications and operating systems along with disparate security technologies into one platform. You can archive, analyze, correlate and trend security and network events, while managing response and remediation workflow.
Posted: 18 Feb 2009 | Published: 18 Feb 2009

IBM

E-Book: Log Management for Compliance
sponsored by SearchSecurity.com & SearchCompliance.com
EBOOK: Log management has become an increasingly important part of managing information technology across the enterprise. This E-Book will look at how compliance has changed IT's requirements for log management tools in general, and how the tools continue to evolve to meet security needs as well.
Posted: 20 Apr 2009 | Published: 20 Apr 2009

SearchSecurity.com & SearchCompliance.com

Enterprise Security: Why you need Effective Log Management
sponsored by SearchCompliance.com
EBOOK: For many, collecting and maintaining logs is a compliance requirement. But IT leaders will soon discover that there are many other practical reasons for maintaining logs. Access today's resource to uncover ways in which log management can tighten data security and boost overall IT performance.
Posted: 23 Apr 2013 | Published: 23 Apr 2013

SearchCompliance.com

How to Effectively Manage the Cloud Logs of Security Events
sponsored by Splunk
EGUIDE: Discover the security growing pains created by the growth of cloud file sharing and collaboration services and how they are presenting new problems including "shadow cloud" and alert fatigue.
Posted: 16 May 2017 | Published: 11 May 2017

Splunk

Presentation Transcript: Virtualized Cardholder Data Environments Capitalizing on Updated PCI SSC Guidance
sponsored by HyTrust
PRESENTATION TRANSCRIPT: 2010 marked the release of the PCI's DSS 2.0 compliance standards, and among a variety of new standards, virtualization has made an appearance. Access this presentation transcript for expert analysis of the latest challenges of PCI compliance, including a detailed overview of concerns related to virtualization.
Posted: 07 Jul 2011 | Published: 07 Jul 2011

HyTrust

LogRhythm and PCI Compliance
sponsored by LogRhythm, Inc.
WHITE PAPER: LogRhythm has extensive experience in helping organizations improve their overall security and compliance posture while reducing costs. This paper illustrates and discusses the 6 domains of PCI DSS requirements as well as uses tables to outline how LogRhythm supports PCI compliance.
Posted: 09 Sep 2009 | Published: 09 Sep 2009

LogRhythm, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences