Log Management Research
-
The Case for Log Management Warehousing – An ESG Analyst Brief
Sponsored by: Hewlett Packard EnterpriseAs log management and analysis needs evolve, legacy products can’t scale, accommodate uncommon log file formats, or provide the right level of real-time or historical analysis. These requirements are driving a transition to a new model called log management warehousing.
-
Securing Virtualized Data Centers
Sponsored by: Trend Micro, Inc.On the surface, virtualized datacenters appear to have all of the same vulnerabilities and security challenges as conventional datacenters. With virtual machines, new challenges minimize the effectiveness of traditional protections. Read on to learn what it takes to secure today’s virtualized data centers.
-
Novell® Sentinel™ Log Manager: Secure, Simple and Powerful Log Management
Sponsored by: Novell, Inc.Learn how Novell's Sentinel Log Manager allows organizations to simplify their compliance efforts, reduce deployment and management costs, and build a scalable compliance and security foundation that grows with their needs.
-
Secure, Simple and Powerful Log Management with Novell® Sentinel™ Log Manager
Sponsored by: Novell, Inc.Read this whitepaper to find out how Novell's Sentinel™ Log Management solution simplifies compliance by collecting, storing, analyzing and managing data logs from all across your enterprise.
-
Novell® Sentinel: Active Event Monitoring for Improved Security and Compliance Management
Sponsored by: Novell, Inc.Novell Sentinel combines the benefits of identity and systems management with real-time security event management and monitoring. It gives you a comprehensive, real-time dashboard view of user, network and application events, so your IT staff can be much more responsive to potential threats.
-
Robot/SCHEDULE Enterprise
Sponsored by: Help/SystemsAre you prepared for your next audit? This webcast explores a new tool that expands job scheduling and server management to your server. Discover how this approach can help your organization pass its next audit with ease.
-
LogRhythm 3-Minute Product Demo
Sponsored by: LogRhythm, Inc.This 3 ½ minute overview will give you an introduction to the LogRhythm solution and how it empowers organizations to comply with regulations in audit, secure their networks and optimize their IT infrastructure.
-
Overcoming the Three Biggest PCI Challenges
Sponsored by: Alert LogicPCI is expensive and difficult to sustain, and many breaches occur after passing an audit. Read this presentation transcript, based on the wencast of the same name, and discover how a cloud-based solution addresses the top 3 pain points and common pitfalls of PCI compliance.
-
Server Monitoring: Centralize and Win
Sponsored by: TNT Software, Inc.One of the main limitations of native tools in a Windows OS is that it stores all of the event & performance logs information locally in each individual system. For an environment with multiple systems, this makes problem analysis much more challenging. This paper will discuss the importance of effective, centralized management solutions.
-
PCI Compliance Made Simple
Sponsored by: Alert LogicMajor data breaches have caused untold damage. These unfortunate events have led to the creation of a data security standard (PCI DSS) that all payment card industry members must comply to. This white paper helps to simplify and provide a deeper understanding of the PCI DSS v1.1 and discusses best practices to achieve PCI compliance.
-
Information Security Magazine, June 2009 - SIMs: More than just a pile of logs
Sponsored by: Information Security MagazineThis month's issue of Information Security Magazine covers a breadth of topics. The cover story this month is about SIM and how it can boost compliance, visibility, and overall business intelligence. Other featured articles cover risk management, convergence, and even the security concerns that come with cloud computing. Read on to learn more.