ComputerWeekly.com Research Library

Powered by Bitpipe.com

Log Management Research

  • Debunking APT myths: What it really means and what you can do about it

    Sponsored by: TechTarget Security

    This E-Guide defines APT, dispels common myths and explains what you can do about this adversary. Additionally, uncover why the idea of keeping intruders out with traditional, perimeter-based security is useless against APT and how you can best protect against modern security threats.

  • e-Guide: Evolving IT security threats: Inside Web-based, social engineering attacks

    Sponsored by: TechTarget Security

    Defending IT infrastructure involves understanding attack methods that are effective today. This expert e-guide highlights several characteristics of modern computer security threats to keep in mind as you assess and improve your information security program, and provides recommendations for dealing with them.

  • SearchSecurity.com E-Guide: Database Security Best Practices: Tuning database audit tools

    Sponsored by: IBM

    Auditing is a key component to security and compliance, and a widely accepted practice by IT operations. In this expert tip, you’ll find an in-depth overview of the tools required to create and collect successful database audits, as well as a set of best practices for tuning audit tools.

  • Log Management Best Practices: Six Tips for Success

    Sponsored by: TechTarget Security

    The right log management tool can go a long way toward reducing the burden of managing enterprise system log data. However, the righ tool can quickly become the wrong tool unless an organization invests the time and effort required to make the most of it. Diana Kelley offers six log management best practices to ensure a successful implementation.

  • Technical Guide on SIM

    Sponsored by: TechTarget Security

    Security information and event management solutions are an indispensible technology in IT security programs to help solidify data protection and compliance initiatives. In this comprehensive guide to SIM, our experts provide authoritative technical advice to help ensure effective SIM deployments and proper on-going maintenance.

  • Information Security IT Decision Checklist: Security Information and Event Management

    Sponsored by: ArcSight, an HP Company

    This Information Security IT Decision Checklist explores key business and technical areas you should consider before selecting a security information and event management system. Also included in this guide is a list of SIMs and log management vendors to help in your decision process.

  • How to collect Windows Event logs to detect a targeted attack

    Sponsored by: M86 Security

    Targeted attacks are growing, and eventually your enterprise will be a target. In this e-guide, expert Richard Bejtlich covers how to collect Windows Event logs to detect an intrusion.

  • The Complete Guide to Log and Event Management

    Sponsored by: Novell, Inc.

    This white paper will provide you with the information you need to purchase an Event and Log Management soutions. This paper outlines both the upside and downside to using both these services sepearte and together.

  • Novell Sentinel: Active Event Monitoring for Improved Security and Compliance Management

    Sponsored by: Novell, Inc.

    Novell Sentinel represents a turning point for enterprises. Costly, time-consuming, error-prone manual processes can now be replaced with an automated, rigorous and predictable security- and compliance monitoring program.

  • Simplify Compliance and Security with Novell® SentinelT Log Manager

    Sponsored by: Novell, Inc.

    Finding a log management solution that can manage risk, simplify regulatory compliance and provide security for you network can be very difficult. There are many systems that contain some of these tools but now there is a system that can do all of this.

  • Log Management Best Practices: Six Tips for Success

    Sponsored by: Novell, Inc.

    The right log management tool can go a long way toward reducing the burden of managing enterprise system log data. However, the righ tool can quickly become the wrong tool unless an organization invests the time and effort required to make the most of it. Diana Kelley offers six log management best practices to ensure a successful implementation.

  • The Complete Guide to Log and Event Management

    Sponsored by: Novell, Inc.

    This paper analyzes the relationship between SIEM and log management - focusing not only on the technical differences and different uses for these technologies, but also on architecting their joint deployments.

  • Simplify Compliance and Security with Novell® Sentinel™ Log Manager

    Sponsored by: Novell, Inc.

    Novell Sentinel Log Manager is delivered as an all-inclusive software appliance that enables organizations to improve IT enterprise security and simplify regulatory compliance in a cost-effective and easy way. Novell Sentinel Log Manager cuts through deployment and management cost and complexity with the expensive proprietary hardware.

  • Webinar: Addressing ‘The Unlucky Seven’ - Security and Compliance Issues that Matter Most to the Mid-Market

    Sponsored by: ArcSight, an HP Company

    This webinar will go through the most critical challenges faced by mid-market companies, and illustrate how collecting and analyzing event data across the enterprise can address those challenges in the context of budget and staff constraints.

  • ArcSight Logger: Universal Log Management Solution

    Sponsored by: ArcSight, an HP Company

    ArcSight Logger is a universal log management solution that unifies searching, reporting, alerting and analysis across any type of enterprise log data - making it unique in its ability to collect, analyze and store massive amounts of data generated by modern networks. Check out this product brief to learn more.

  • Granular application control, intelligence and real-time visualization

    Sponsored by: SonicWALL

    It can be a real challenge for IT administrators to efficiently deliver critical corporate solutions while also contending with employee use of wasteful and often dangerous applications. Critical applications need bandwidth prioritization while social media and gaming applications need to be bandwidth throttled or completely blocked.

  • Tripwire Enterprise and Tripwire Log Center: Integrated for Unparalleled Security

    Sponsored by: Tripwire, Inc.

    Tools for monitoring and protecting the IT infrastructure have evolved into powerful, yet isolated, islands of defense. Because modern threats can take advantage of this isolation, IT security needs a single, comprehensive view of infrastructure security.

  • Tripwire Log Center

    Sponsored by: Tripwire, Inc.

    A decade or more ago, logs of events recorded by firewalls, intrusion detection systems and other network devices were considered more of a nuisance than a help. There were too many of them, they weren’t easily collected, and there was no easy way to make sense of which were important.

  • A Pragmatic Approach to SIEM

    Sponsored by: Tripwire, Inc.

    In this paper we will take a look at this disturbing trend and provide useful guidance for maximizing the value of SIEM and log management tools, while focusing on protecting systems and data not on simply checking the compliance check box.

  • E-Guide A Decision Maker’s Guide to Log Management

    Sponsored by: ArcSight, an HP Company

    While often underappreciated by IT professionals, logs are an extremely useful source of data for IT shops. Often undervalued as a strategic weapon, log management tools can play a vital role in securing mission-critical data and assuring accountability. Learn what to consider when it’s time to get a handle on your logs.

  • Essential Guide to SIMs Strategy

    Sponsored by: Information Security Magazine

    Take an incremental approach to security information and event management. Start slow, narrow your goals and be patient with these expensive and complex tools, otherwise data overload will bring you down. Read this guide to find out so much more.

  • Protection Starts with Security Management Solutions from Novell

    Sponsored by: Novell, Inc.

    Enterprises are under constant attack from internal and external threats. Repelling today’s threats requires a new approach to security—an approach that emphasizes centralized log management and security event management. Novell makes it simple to get on the path to better security with our Security Management solutions.

  • Sentinel Log Manager Review

    Sponsored by: Novell, Inc.

    This paper is a review of the stand-alone Sentinel Log Manager and how it stands up to keyconcerns that survey respondents raised about log managers, including collection, storage andsearching/reporting capabilities.

  • E-Guide: IT Decision Checklist: SIMs and Log Management

    Sponsored by: Tripwire, Inc.

    Security information management systems are effective platforms for the collection, analysis and storage of events from a broad range of systems and devices. We’ll outline what you should look for to get the most relevant data from SIMs. Read this paper to find out more.

  • Pulling the Plug on Legacy Log Management

    Sponsored by: Tripwire, Inc.

    When it comes to log management today, CSOs have been left in the lurch. According to this IDG Research Services survey, organizations are poised to “rip and replace” legacy technology to get a better handle on compliance and security. Read on to learn why so many are scrapping their old log management system and starting fresh.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.