Log Management E-book by RSA, The Security Division of EMCWelcome, Guest      sign in | register | help

   Search for:        Advanced Search
Research Abstract
Log Management E-book
by RSA, The Security Division of EMC

> View this now

Published on: June 24, 2009
Type of content: EBOOK
Format: Unknown
Length: 32 pages
Price: FREE


Bound to regulations? Then you're no stranger to log management, and the importance of analyzing the reams of data your devices produce. Regulations are requiring organizations to collect, store, review and act on log data, on an unprecedented scale. In the past, your network administrators probably plowed through logs to track down device issues, and they helped your incident response teams get to the heart of a suspected breach or other serious issue. Well, log management techniques and technologies are growing by leaps and bounds. And it's a good thing, too, because the requirements on log management are growing just as quickly.


This E-book examines the current trends in log management. The four major chapters of this E-book focus on the use of log management as it pertains to:

    complianceanalysisforensicsand an SIEM alternative

Read on to learn more.

> View Company Report
> View all content by this company
> Return to Search Results

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints

  TechTarget - The IT Media ROI Experts