by RSA, The Security Division of EMC
> View this now
Published on: June 24, 2009
Type of content: EBOOK
Length: 32 pages
Bound to regulations? Then you're no stranger to log management, and the importance of analyzing the reams of data your devices produce. Regulations are requiring organizations to collect, store, review and act on log data, on an unprecedented scale. In the past, your network administrators probably plowed through logs to track down device issues, and they helped your incident response teams get to the heart of a suspected breach or other serious issue. Well, log management techniques and technologies are growing by leaps and bounds. And it's a good thing, too, because the requirements on log management are growing just as quickly.
This E-book examines the current trends in log management. The four major chapters of this E-book focus on the use of log management as it pertains to:
complianceanalysisforensicsand an SIEM alternative
Read on to learn more.
> View Company Report
> View all content by this company
> Return to Search Results