E-Book: Log Management for Compliance by SearchSecurity.com & SearchCompliance.comWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Research Abstract
E-Book: Log Management for Compliance
by SearchSecurity.com & SearchCompliance.com

> View this now

Published on: April 20, 2009
Type of content: EBOOK
Format: Unknown
Length: 26 pages
Price: FREE

Overview:

Log management has become an increasingly important part of managing information technology across the enterprise. Every significant device and application generates logs, which makes them the most accurate record of who uses key systems, what they do, and when they do it. Logs also record system actions, making them invaluable for troubleshooting. But for IT managers, the challenge is aggregating, collating, and distributing information from many logs to create meaningful analysis and reporting. Log management software has become highly interesting to more senior managers in IT in recent years because it is a powerful tool for at least two initiatives that are high on the agendas of CIOs and other senior level IT managers: improving information security and meeting regulatory compliance mandates.


 


This E-Book will look at how compliance has changed IT's requirements for log management tools in general, and how the tools continue to evolve to meet security needs as well.


 


Chapter 1 - Choosing log management tools for compliance:
Log management tools were originally designed for troubleshooting and then were adopted for security forensics. Now IT organizations are realizing that they can be a vital part of their compliance infrastructure. This chapter will look at the purchase and evaluation criteria for log management tools for compliance use: what reports, device support, and audit capabilities you need to pass your compliance audit.


 


Chapter 2 - Integrating log management into your compliance operations:
This chapter will focus on policies and processes for effective log management for regulatory compliance and, oh yes, security. Requirement 10 of PCI, for instance, calls for the monitoring and testing of networks and specifies that an organization must review logs for all system components at least daily. Log aggregation/log management tools help meet this requirement. The chapter will explain how to build a review process, outline who is accountable and create proper documentation.


 


Sponsored By: Alert Logic, ArcSight, eIQnetworks, LogLogic, LogRhythm, Prism Microsystems

> View Company Report
> View all content by this company
> Return to Search Results


         
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts