ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:One Identity

  • Log Management Essentials

    In IT environments, a wide variety of sources generate log messages in many different formats. Whether you are trying to enhance security, improve operations or meet compliance objectives, log data contains valuable information and harnessing that data is critical. In this white paper, learn how to properly implement log management.

  • How to Forward Log Messages to Splunk From syslog-ng

    Splunk is a popular search and analysis platform. Many users of Splunk have also deployed syslog-ng in their environments to help with tasks like collecting and centralizing log messages from network devices. In this white paper, learn about 5 use cases for syslog-ng and how to get them started.

  • NIST Cybersecurity Framework

    This white paper provides an overview of the NIST Cybersecurity framework, an internationally widespread collection of best practices on how organizations should develop and upgrade their IT security infrastructure.

  • Storing Logs in Elasticsearch Using Syslog-ng

    Elasticsearch is a scalable, searchable NoSQL DB that boasts a main appeal of syslog-ng capabilities (a high-performance log collector that works with data coming from a wide variety of sources). Read this white paper to learn more about Elasticsearch and why you may want it to process your logs.

  • Logging in Docker using syslog-ng

    There are many use cases for containers, but have you considered containerization of your central log server? In this whitepaper, find a demonstration for containerizing your event logging, and learn why Docker is the go-to choice for central log servers.

  • Optimizing SIEM

    SIEM solutions form the core of many enterprises' IT Security strategy but they can be expensive to deploy and maintain. Optimizing your SIEM solution can reduce costs and improve performance. In this white paper, learn about the challenges, solutions and benefits of optimizing your SIEM solution.

  • Message Classification with syslog-ng

    Log messages can be used to detect security incidents, operational problems, policy violations, and are useful in auditing and forensics situations. Read this white paper to find out how system logging can help ease the burden of system administrators and see how you can simplify your logging architecture with syslog-ng.

  • Azure Active Directory vs. Classic AD

    Jump into this E-Guide to find out how to pinpoint the differences between the Microsoft Azure edition of Active Directory and the classic Windows Active Directory – and how to use those differences to your enterprise's advantage.

  • Easy Active Directory Clean-Up Tips

    Inside this E-Guide, read through some Active Directory organization strategies designed to minimize the headaches that often accompany user group restructuring projects – and ultimately reduce the time spent sifting through messy group architectures.

  • Go Back to the Basics with Active Directory

    Despite your level of familiarity, it never hurts to keep up-to-date on basic Active Directory best practices. Inside this E-Guide, brush up on some basic Active Directory tips and tricks around domain controllers, cloud AD interactions, and more.

  • How Can Privileged Access Accounts Be Managed in Large Companies?

    According to a Verizon Data Breach Report, 55% of insider misuse incidents involved access abuse. Inside this e-guide, security expert Michael Cobb, dives into the risk of privileged access and reveals best practices for securing privileged access.

  • How can organizations get control over privileged identity management?

    Recent research showed 72% of temporary workers and contractors are given administrative privileges on their employers' systems. Explore this expert e-guide to learn how you can improve the security of privileged access by minimizing exposure of sensitive activities and information

  • IAM for the Real World – Privileged Account Management

    Read this e-book for essential information on common security issues with privileged account management (PAM) – and how you can minimize or eliminate them.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.