Separation or Convergence? The Conflicts Between Log Management and SIM


Episode Artwork
1.0x
0% played 00:00 00:00
Aug 05 2009 27 mins   1
Log Management is a necessary first step, but only a baseline technology. Compliance mandates and good security practice also require real-time, end-to-end monitoring to identify, prioritize, analyze and remediate the true threats. Given the increase in targeted stealth attacks, clear visibility is more important than ever to protect your data. Consequently, Log Management alone is just not enough.

Learn how the convergence of Log Management and Security Information Management (SIM) is changing the way we think about security, and why the demand for SIM is surging, even in the face of the current economic downturn.

Mark Nicolett and netForensics Vice President of Products, Tracy Hulver, discuss:

Shortfalls of traditional Log Management solutions
Recommendations for effective real-time threat identification
Pitfalls to avoid when deploying SIM technology
How to make your existing log data actionable
Combining and simplifying SIM and Log Management

Log Management is a necessary first step, but only a baseline technology. Compliance mandates and good security practice also require real-time, end-to-end monitoring to identify, prioritize, analyze and remediate the true threats. Given the increase in targeted stealth attacks, clear visibility is more important than ever to protect your data. Consequently, Log Management alone is just not enough.

Learn how the convergence of Log Management and Security Information Management (SIM) is changing the way we think about security, and why the demand for SIM is surging, even in the face of the current economic downturn.