Log Management White Papers
-
Unlocking the Opportunity of SIEM Technology
Sponsored by: TechTarget SecurityExplore how a security information and event management (SIEM) system works, what types of data you can integrate into it, the process for detecting threats/incidents, and steps you should take to develop a successful SIEM capabilities.
-
The Improvement and Evolution of SIEM
Sponsored by: TechTarget SecurityGet an in-depth look at the past, present and future of security information and event management (SIEM) technology in this informative E-Guide from SearchSecurity.com.
-
The Future of Next-Generation SIEM
Sponsored by: TechTarget SecurityThis expert E-Guide explores what it means to be an "ideal" security information and event management (SIEM) system and takes a look into a crystal ball to explore five futures SIEMs must conquer to be considered next-gen systems. View now to learn more!
-
Balance the power and challenges of IT monitoring
Sponsored by: TechTarget IT OperationsIT monitoring tools deliver plenty of data, but sometimes, the volume can be a problem. It's a challenge to know how closely to monitor infrastructure and applications, especially when some tools monitor apps in real time.
-
A Guide to SIEM Platforms, Benefits and Features
Sponsored by: TechTarget SecuritySIEM systems enable organizations to centralize indecent response, detection and handling, as well as data logging for compliance. This e-guide is a collection of resources highlighting SIEM benefits, criteria and tools. Read on to evaluate which SIEM system is right for you.
-
User behavior analytics tackles cloud, hybrid environments
Sponsored by: TechTarget SecurityIn this issue of Information Security, explore why organizations are investing in user behavior analytics for on-premises and cloud.
-
Security data scientists on how to make your data useful
Sponsored by: TechTarget SecurityIn this issue of Information Security magazine, CISOs and security data scientists offer strategies for effective use of data analytics and machine learning to advance enterprise threat research.
-
A Computer Weekly buyer's guide to log management
Sponsored by: TechTarget ComputerWeekly.comIn this 13-page buyer's guide, Computer Weekly looks at how companies analyse server and security logs to tackle cybercrime and internal fraud;how application log management provides insight into application behaviour, which can be used to build better software;and how network administrators can use data from log files to automate security systems.
-
Computer Weekly – 21 July 2015: How the internet of things could save the honeybee
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, with bee populations being decimated, we find out how the internet of things could save the honeybee. Amid fears that artificial intelligence could end human innovation, we hear from the experts on AI about the reality. And we examine the challenges of customer service in a multi-channel world. Read the issue now.
-
Computer Weekly July 2015: The Most Influential Women in UK IT
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we reveal our annual list of the 50 most influential women in UK IT – and talk to this year's winner, Citrix vice president Jacqueline de Rojas. Also, we look at how ARM chips are making inroads into the data centre as energy awareness becomes a growing corporate IT issue.
-
Computer Weekly – 7 July 2015: The IT behind Angry Birds
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we talk to the CIO of Rovio Entertainment, the company behind the gaming phenomenon Angry Birds, about how he supports a global business with a five-person IT team. We assess your options for moving off Windows Server 2003 now support is ending. And our buyer's guide looks at log management. Read the issue now.
-
Modern Infrastructure – November/December 2014
Sponsored by: TechTarget Data CenterAs cloud computing, consumerization and virtualization trends converge, IT departments have been forced to re-think their strategy and tactics. Modern Infrastructure explores the impact of these shifts on data center infrastructure and guides IT managers in their decision making.
-
Extending Security Intelligence with Big Data
Sponsored by: IBMLearn how IBM Security Intelligence with Big Data can help organizations gain insights into advanced data threats.
-
Top 5 Truths About Big Data Hype and Security Intelligence
Sponsored by: Hewlett Packard EnterpriseThis resource outlines the top five truths behind the Big Data hype and explains why Big Data Security Analytics (BDSA) is the future of security intelligence. Read on to learn how it offers the insight you need to perform real-time threat detection and defense.
-
Countering Cyber-Crime with a Sharp Eye and a Clear Plan
Sponsored by: TechTarget SecurityBigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.
-
Lake Health Enhances Patient Experience with HP ArcSight
Sponsored by: Hewlett Packard EnterpriseUncover the SIEM a healthcare provider put in place which helped them take a proactive approach to information security, mitigate anomalies, increase visibility, ensure regulatory compliance, and more!
-
How to Protect the Increasingly Vulnerable Energy Industry
Sponsored by: IBMLearn how an integrated security intelligence platform provides the necessary components to help energy and utilities companies automate compliance and risk management, detect and manage threats, and protect the smart grid from both security breaches and cyber-attacks.
-
Leverage Security Intelligence for Government Agencies
Sponsored by: IBMThis resource features a security intelligence platform that's paired with data analytics to help prevent, defend, remediate, and analyze more security incidents and policy violations than traditional information security systems.
-
Better Security Intelligence for the Finance Industry
Sponsored by: IBMA security intelligence platform is a key element for fighting the many threats the financial institution faces, and this white papers describes on such platform.
-
QRadar Risk Manager: Security Intelligence Keeps You Ahead of Threats
Sponsored by: IBMThis white paper highlights an automated risk management solution that correlates information on asset vulnerabilities and device configurations to better predict risks before they occur.
-
Proactive data security, audit and compliance solutions
Sponsored by: IBMAccess this white paper for key information about a data management solution that supports enterprises in their entirety, and ensures automated, integrated compliance and security across all platforms.
-
CARA Meets PCI Requirements and Gains Network Visibility: A Case Study
Sponsored by: LogRhythm, Inc.This case study reveals which solution CARA, a network of 700+ restaurants across Canada, put in place to simplify their PCI compliance and audit processes and improve their security posture. View now to learn more!
-
Strategies to Maintain PCI DSS Compliance
Sponsored by: GeoTrust, Inc.This e-guide outlines strategies for streamlining key PCI DSS processes to ensure that comprehensive compliance is achieved efficiently – for maximum business benefit.
-
10 Tips to Help You Minimize the Duration and Impact of a Security Breach
Sponsored by: Dell SecureWorksUncover the top 10 things you should do to enhance the security of your enterprise and reduce the duration and impact of a security breach.
-
Security Information Management Systems Aspire to Real-Time Security
Sponsored by: Hewlett Packard EnterpriseExplore security information management (SIM) systems' capabilities for real-time security, learn why the definition of "real-time" may need altering, and uncover the factors preventing SIMs from attaining real-time status.