ComputerWeekly.com Research Library

Powered by Bitpipe.com

Log Management Research

  • Unlocking the Opportunity of SIEM Technology

    Sponsored by: TechTarget Security

    Explore how a security information and event management (SIEM) system works, what types of data you can integrate into it, the process for detecting threats/incidents, and steps you should take to develop a successful SIEM capabilities.

  • The Improvement and Evolution of SIEM

    Sponsored by: TechTarget Security

    Get an in-depth look at the past, present and future of security information and event management (SIEM) technology in this informative E-Guide from SearchSecurity.com.

  • The Future of Next-Generation SIEM

    Sponsored by: TechTarget Security

    This expert E-Guide explores what it means to be an "ideal" security information and event management (SIEM) system and takes a look into a crystal ball to explore five futures SIEMs must conquer to be considered next-gen systems. View now to learn more!

  • SIM Technical Guide

    Sponsored by: TechTarget Security

    In this SearchSecurity.com Technical Guide on security information and event management (SIEM) systems, we explore the current state of SIEMs in the enterprise today and whether augmentation, cloud service, or rip and repair is your best upgrade option.

  • Effective Ways to Search Log Files

    Sponsored by: TechTarget Security

    Security log analysis is essential for effective security and risk management. But with countless logs generated every day, searching log files can be a burdensome headache. In this e-guide, expert John Burke uncovers the best methods for thorough security log analysis with an evolutionary path that mixes old concepts with new ones.

  • Technical Guide on SIM: Moving beyond network security toward protecting applications

    Sponsored by: TechTarget Security

    SIMs have been widely adopted for their value in correlating, reporting and alerting on network security. But SIMs can be used for more than just network security monitoring. The same tools can also bring value to application managers if used correctly. In this technical guide, gain 4 steps for integrating applications into enterprise SIMs.

  • Log management best practices

    Sponsored by: TechTarget Security

    Investing in the correct log management tool can ensure that the pressures of maintaining enterprise system log data are greatly decreased. Although the right tool is very helpful, the possibility of it turning into the wrong tool can happen in the blink of an eye if the correct steps are not taken.

  • E-Guide: Selecting a SIM for midmarket business

    Sponsored by: TechTarget Security

    This expert E-Guide discusses the evolvement of SIM tools, differences in deployment processes and top requirements you should consider before making a decision.

  • 10 Tips to Help You Minimize the Duration and Impact of a Security Breach

    Sponsored by: Dell SecureWorks

    Uncover the top 10 things you should do to enhance the security of your enterprise and reduce the duration and impact of a security breach.

  • Security Information Management Systems Aspire to Real-Time Security

    Sponsored by: Hewlett Packard Enterprise

    Explore security information management (SIM) systems' capabilities for real-time security, learn why the definition of "real-time" may need altering, and uncover the factors preventing SIMs from attaining real-time status.

  • Enterprise Security: Why you need Effective Log Management

    Sponsored by: TechTarget Security

    For many, collecting and maintaining logs is a compliance requirement. But IT leaders will soon discover that there are many other practical reasons for maintaining logs. Access today's resource to uncover ways in which log management can tighten data security and boost overall IT performance.

  • Virtualization Security: Protecting Virtualized Environments

    Sponsored by: TechTarget ComputerWeekly.com

    This extract from the book Virtualization Security, includes a 30% discount for Computer Weekly readers.

  • Solution Spotlight: How Secure Managed File Transfers Help Meet Compliance Requirements

    Sponsored by: IBM and SI Architects

    This expert E-Guide explores the steps enterprises need to take to secure file transfer and regulatory compliance. Read on and learn how organizations can ensure file transfer security today.

  • Presentation Transcript: The Top 5 Pitfalls of Log Management and SIEM Deployments and How to Avoid Them

    Sponsored by: eIQnetworks

    This valuable resource counts down the top 5 pitfalls of log management and security information and event management (SIEM) deployments and offers essential advice for avoiding these challenges and achieving SIEM success.

  • Tripwire Log Center Product Brief

    Sponsored by: Tripwire, Inc.

    Consult this informative white paper to learn how log management is helping to better identify threats and deploy security information and event management systems (SIEM). Learn how you can uncover suspicious activities and improve security by reading this asset now.

  • Smart, Visible and Automated: The New Log Management

    Sponsored by: Tripwire, Inc.

    View this informative white paper to learn more about moving to a more advanced risk protection policy. Improve your log management capabilities by implementing functionality with SIEM, file integrity monitoring and more!

  • University of the Sunshine Coast Improves Security with Sentinel

    Sponsored by: NetIQ

    Access this case study to uncover how Sentinel helped one educational institution cost-effectively meet audit requirements for monitoring access to core finance systems, provide simpler access to network resources for users while improving security.

  • The changing SIEM landscape: What you should know to stay ahead

    Sponsored by: TechTarget Security

    While SIEM systems are often expensive and complex, they play a vital part in your risk and compliance strategy. This technical guide on SIM explores SIEM technologies today and offers exclusive tips and considerations for your deployment.

  • Improving regulatory compliance management through log analysis, SIM

    Sponsored by: HP Enterprise Security

    This E-Guide highlights the importance of log analysis and security information and event management (SIEM) in improving regulatory compliance management.

  • Continuous Monitoring: Responding to New Threats in More Complex IT Environments

    Sponsored by: Tripwire, Inc.

    Governments today are focusing on the practice of continuous monitoring as a means to providing the much needed balance between data access and protection. In this paper, learn more about continuous monitoring, including what is it and why it’s needed, guidelines for implementing it, key capabilities of an effective solution, and more.

  • Best Practices for Enhancing Microsoft Exchange Server 2010 Data Protection and Availability using Dell EqualLogic Snapshots

    Sponsored by: DellEMC and Intel®

    IT leaders are challenged by the growth of the amount of data they have to manage. While data management encompasses several areas of an organization, ensuring the data protection and business continuity is one of the most critical aspects. Inside this white paper, uncover strategies for avoiding data loss and lack of application availability.

  • A Decision Maker's Guide to Log Management

    Sponsored by: HP Enterprise Security

    Often undervalued as a strategic weapon, log management tools can play a vital role in securing mission-critical data and assuring accountability. Inside this expert resource, learn what factors to consider when it’s time to get a handle on your logs.

  • HP ArcSight Express 3.0

    Sponsored by: HP Enterprise Security.

    View this white paper to explore how to maintain the security of your corporate IT assets by detecting more incidents and addressing larger set of log data with HP ArcSight SIEM solutions.

  • Presentation Transcript: Incident Response - Are you prepared?

    Sponsored by: Dell SecureWorks

    In this presentation transcript, Lee Lawson, Head of Response Service for Dell SecureWorks EMEA outlines a successful Incident Response approach and best practices for your organisation.

  • SearchSecurity.com E-Guide: Database Security Best Practices: Tuning database audit tools

    Sponsored by: IBM

    Auditing is a key component to security and compliance, and a widely accepted practice by IT operations. In this expert tip, you’ll find an in-depth overview of the tools required to create and collect successful database audits, as well as a set of best practices for tuning audit tools.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.