ComputerWeekly.com Research Library

Powered by Bitpipe.com

Log Management Research

  • The Case for Log Management Warehousing – An ESG Analyst Brief

    Sponsored by: Hewlett Packard Enterprise

    As log management and analysis needs evolve, legacy products can’t scale, accommodate uncommon log file formats, or provide the right level of real-time or historical analysis. These requirements are driving a transition to a new model called log management warehousing.

  • Securing Virtualized Data Centers

    Sponsored by: Trend Micro, Inc.

    On the surface, virtualized datacenters appear to have all of the same vulnerabilities and security challenges as conventional datacenters. With virtual machines, new challenges minimize the effectiveness of traditional protections. Read on to learn what it takes to secure today’s virtualized data centers.

  • Secure, Simple and Powerful Log Management with Novell® Sentinel™ Log Manager

    Sponsored by: Novell, Inc.

    Read this whitepaper to find out how Novell's Sentinel™ Log Management solution simplifies compliance by collecting, storing, analyzing and managing data logs from all across your enterprise.

  • Novell® Sentinel™ Log Manager: Secure, Simple and Powerful Log Management

    Sponsored by: Novell, Inc.

    Learn how Novell's Sentinel Log Manager allows organizations to simplify their compliance efforts, reduce deployment and management costs, and build a scalable compliance and security foundation that grows with their needs.

  • Novell® Sentinel™: Active Event Monitoring for Improved Security and Compliance Management

    Sponsored by: Novell, Inc.

    Novell Sentinel combines the benefits of identity and systems management with real-time security event management and monitoring. It gives you a comprehensive, real-time dashboard view of user, network and application events, so your IT staff can be much more responsive to potential threats.

  • Robot/SCHEDULE Enterprise

    Sponsored by: Help/Systems

    Are you prepared for your next audit? This webcast explores a new tool that expands job scheduling and server management to your server. Discover how this approach can help your organization pass its next audit with ease.

  • LogRhythm 3-Minute Product Demo

    Sponsored by: LogRhythm, Inc.

    This 3 ½ minute overview will give you an introduction to the LogRhythm solution and how it empowers organizations to comply with regulations in audit, secure their networks and optimize their IT infrastructure.

  • Overcoming the Three Biggest PCI Challenges

    Sponsored by: Alert Logic

    PCI is expensive and difficult to sustain, and many breaches occur after passing an audit. Read this presentation transcript, based on the wencast of the same name, and discover how a cloud-based solution addresses the top 3 pain points and common pitfalls of PCI compliance.

  • Server Monitoring: Centralize and Win

    Sponsored by: TNT Software, Inc.

    One of the main limitations of native tools in a Windows OS is that it stores all of the event & performance logs information locally in each individual system. For an environment with multiple systems, this makes problem analysis much more challenging. This paper will discuss the importance of effective, centralized management solutions.

  • PCI Compliance Made Simple

    Sponsored by: Alert Logic

    Major data breaches have caused untold damage. These unfortunate events have led to the creation of a data security standard (PCI DSS) that all payment card industry members must comply to. This white paper helps to simplify and provide a deeper understanding of the PCI DSS v1.1 and discusses best practices to achieve PCI compliance.

  • Information Security Magazine, June 2009 - SIMs: More than just a pile of logs

    Sponsored by: Information Security Magazine

    This month's issue of Information Security Magazine covers a breadth of topics. The cover story this month is about SIM and how it can boost compliance, visibility, and overall business intelligence. Other featured articles cover risk management, convergence, and even the security concerns that come with cloud computing. Read on to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.