ComputerWeekly.com Research Library

Powered by Bitpipe.com

Log Management Research

  • Log Management: Configure, Troubleshoot, and Analyze

    Sponsored by: Logentries

    This resource explores how to troubleshoot common issues with the logging framework of choice for critical production .NET apps. Discover how to leverage log analytics to monitor performance and gain heightened visibility into your .NET apps and infrastructure.

  • Log Management: Troubleshooting, Performance Monitoring, and More

    Sponsored by: Logentries

    This resource explores how to leverage an easy-to-use log analysis tool for collecting, searching, and monitoring logs. Get targeted advice for monitoring Tableau logs, boosting performance, creating dashboards, and more.

  • Troubleshooting Microsoft SQL Server

    Sponsored by: Logentries

    Many companies leverage SQL Server, but does your organization have a modern strategy in place to monitor the overall health of your database and identify performance bottlenecks? Access this resource to learn how to gather logs, integrate and analyze the data, generate key visualizations, and troubleshoot your SQL Server.

  • 10 Best Practices for Log Management & Analytics

    Sponsored by: Logentries

    Log management has become a key aspect of IT operations in the wake of the massive growth of machine-generated data. Inside, discover 10 best practices for managing and gaining insight from your log systems.

  • Using Logs to Address Compliance Standards

    Sponsored by: Logentries

    In this white paper, learn common log requirements in 3 major industries, what to look for in a log management tool, real-world examples of how to use a log management system for investigative issues, and more.

  • What are the Real Costs of the DIY ELK Stack?

    Sponsored by: Logentries

    Learn some of the less well understood requirements of a robust DIY ELK Stack, the benefits and consequences of using the elastic stack for DIY logging, the costs compared to managed services, and more.

  • Log Management and Automation for NIST Cyber Security Framework

    Sponsored by: LogRhythm, Inc.

    This white paper explores how a comprehensive log management and analysis system can help your organization meet or exceed NIST-CSF guidelines and compliance regulations. Access now to learn more about NIST-CSF requirements and find out how to automate log collection, archiving, and recovery across your IT infrastructure.

  • Getting Started with Container Monitoring

    Sponsored by: Splunk

    Containers may add complexity to your infrastructure, but it doesn't have to add complexity to your job. Get started with this guide to container monitoring and start taking advantage of better code to deliver the best experience to end users.

  • Combating the Insider Threat: Your Guide to Staying Secure

    Sponsored by: Cisco Systems, Inc.

    This e-book explores the danger of insider threats and provides suggestions on preventing them. Read on to learn why you need to focus your security inward and what practices will help you do so.

  • What Story Does Your IT Security Tell?

    Sponsored by: Prelert

    In this resource, you will discover how to analyze log data and locate anomalies in order to combat advanced cyberthreats with an anomaly detection application. Access this resource to apply behavioral analytics to any data resource—including Windows event logs, DNS logs, and firewall logs.

  • A Computer Weekly buyer's guide to log management

    Sponsored by: ComputerWeekly.com

    In this 13-page buyer's guide, Computer Weekly looks at how companies analyse server and security logs to tackle cybercrime and internal fraud;how application log management provides insight into application behaviour, which can be used to build better software;and how network administrators can use data from log files to automate security systems.

  • Computer Weekly – 21 July 2015: How the internet of things could save the honeybee

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, with bee populations being decimated, we find out how the internet of things could save the honeybee. Amid fears that artificial intelligence could end human innovation, we hear from the experts on AI about the reality. And we examine the challenges of customer service in a multi-channel world. Read the issue now.

  • Computer Weekly July 2015: The Most Influential Women in UK IT

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we reveal our annual list of the 50 most influential women in UK IT – and talk to this year's winner, Citrix vice president Jacqueline de Rojas. Also, we look at how ARM chips are making inroads into the data centre as energy awareness becomes a growing corporate IT issue.

  • Computer Weekly – 7 July 2015: The IT behind Angry Birds

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we talk to the CIO of Rovio Entertainment, the company behind the gaming phenomenon Angry Birds, about how he supports a global business with a five-person IT team. We assess your options for moving off Windows Server 2003 now support is ending. And our buyer's guide looks at log management. Read the issue now.

  • Research Report: The Benefits of Security Analytics

    Sponsored by: Prelert

    Read this report to discover what IT pros have to say about security analytics' most useful features, its value, and more.

  • Free Download: Real-Time, Comprehensive Threat Detection

    Sponsored by: AlienVault

    Save time by drilling down threat details into one console and defending against today's threats with all of the essential security tools you need. Test drive the AlienVault USM with a 30-day free download trail today.

  • Get a Closer Look at Security Alerts

    Sponsored by: Prelert

    Watch this webinar to discover how anomaly detection can update your IT for today's security environment.

  • Modern Infrastructure – November/December 2014

    Sponsored by: SearchDataCenter.com

    As cloud computing, consumerization and virtualization trends converge, IT departments have been forced to re-think their strategy and tactics. Modern Infrastructure explores the impact of these shifts on data center infrastructure and guides IT managers in their decision making.

  • Extending Security Intelligence with Big Data

    Sponsored by: IBM

    Learn how IBM Security Intelligence with Big Data can help organizations gain insights into advanced data threats.

  • Top 5 Truths About Big Data Hype and Security Intelligence

    Sponsored by: Hewlett Packard Enterprise

    This resource outlines the top five truths behind the Big Data hype and explains why Big Data Security Analytics (BDSA) is the future of security intelligence. Read on to learn how it offers the insight you need to perform real-time threat detection and defense.

  • Countering Cyber-Crime with a Sharp Eye and a Clear Plan

    Sponsored by: SearchSecurity.com

    Bigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.

  • Top Tips for Collecting, Storing, and Analyzing Operations Log Data

    Sponsored by: Hewlett Packard Enterprise

    View this webcast to learn about an operations log intelligence program that enables you to easily collect, centralize, archive and search your log files. Watch now for a brief demonstration of this software and explore the many benefits it can offer your organization.

  • Lake Health Enhances Patient Experience with HP ArcSight

    Sponsored by: Hewlett Packard Enterprise

    Uncover the SIEM a healthcare provider put in place which helped them take a proactive approach to information security, mitigate anomalies, increase visibility, ensure regulatory compliance, and more!

  • How to Protect the Increasingly Vulnerable Energy Industry

    Sponsored by: IBM

    Learn how an integrated security intelligence platform provides the necessary components to help energy and utilities companies automate compliance and risk management, detect and manage threats, and protect the smart grid from both security breaches and cyber-attacks.

  • Leverage Security Intelligence for Government Agencies

    Sponsored by: IBM

    This resource features a security intelligence platform that's paired with data analytics to help prevent, defend, remediate, and analyze more security incidents and policy violations than traditional information security systems.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.