• audit log (AL)

    An audit log is a document that records an event in an information (IT) technology system.

  • access list (AL)

    An access list (AL) is a list of permissions used in physical and information technology (IT) security to control who is allowed contact with a corporate asset.  The asset can be a building, a room...

  • Survey finds mobile device protection a top IT priority

    Mobile device protection is a major concern for IT departments, a SearchCompliance.com survey found. Here's expert advice on mobile strategy trends and how the cloud can help.

  • event log manager (ELM)

    An event log manager (ELM) is an application that tracks changes in an organization's IT infrastructure.

Log management software solutions

Email Alerts

Register now to receive SearchCompliance.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Log management tightens data security and IT performance

    Log management is a compliance cornerstone in today's enterprise IT environment. The chief benefit of log management is the way in which it offers IT compliance officers the ability to ferret out malicious behaviors and data security threats posed bo... 

  • Guide to log management for compliance

    Log management has become an increasingly important part of managing information technology across the enterprise. For IT managers, it's a challenge to aggregate, collating, and distributing information from many logs to create meaningful analysis an... 

  • audit log (AL)

    An audit log is a document that records an event in an information (IT) technology system. 

  • access list (AL)

    An access list (AL) is a list of permissions used in physical and information technology (IT) security to control who is allowed contact with a corporate asset.  The asset can be a building, a room or a computer file.  

  • event log manager (ELM)

    An event log manager (ELM) is an application that tracks changes in an organization's IT infrastructure. 

  • database activity monitoring (DAM)

    Database activity monitoring (DAM) systems monitor and record activity in a database and then generate alerts for anything unusual. 

  • Event log management software (ELMS)

    Event log management software (ELMS) is an application used to monitor change management and prepare for compliance audits at enterprises. 

About Log management software solutions

Log management tasks can seem daunting, but they need to be tackled. Find the latest news, advice and best practices on topics related to log management, such as tools for log collection, privacy laws and PCI compliance requirements.