Data Management: Log Management
Shoosmiths Case Study
Click for more details
Optimize Log Management
Log management is a cornerstone of good security practice as well as the underpinning of all compliance requirements. Your organization has asked you to ensure you comply with best practices for secure collection, transmission, and storage of logs. The sheer wealth of potential information to collect across the enterprise leads you to conclude that you need to deal with billions of log events per day, across diverse sources from the network through to the operating systems and, ultimately, applications and databases. Not only will you need to architect a secure implementation, you must ensure that the solution scales and can meet the objectives of the business.
Security Management 2.0: Time to Replace Your SIEM?
This white paper published by independent security research firm, Securosis takes a brutally candid look at triggers for considering a new security management platform, walking through each aspect of the decision, and presenting a process to migrate.