New & Notable
Log management software solutions News
May 30, 2014
Tenable Network Security CSO Marcus Ranum reveals that data-driven intelligence is not as critical as system logging to security strategy.
May 31, 2012
Mobile device protection is a major concern for IT departments, a SearchCompliance.com survey found. Here's expert advice on mobile strategy trends and how the cloud can help.
September 24, 2010
Our latest roundup of IT compliance products features software to help with log management, data security protection and localized governance, risk and compliance data assessment.
March 15, 2010
Real-time compliance, social networking security, evolving cybersecurity threats and cloud computing compliance were among the top themes at RSA Conference 2010.
Log management software solutions Get Started
Bring yourself up to speed with our introductory content
An audit log is a document that records an event in an information (IT) technology system. Continue Reading
An access list (AL) is a list of permissions used in physical and information technology (IT) security to control who is allowed contact with a corporate asset. The asset can be a building, a room or a computer file. Continue Reading
An event log manager (ELM) is an application that tracks changes in an organization's IT infrastructure. Continue Reading
Evaluate Log management software solutions Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Log files contain rich and useful management data. With the right software tools and a few navigation tips, you can maximize and implement the information that logs provide. Continue Reading
Manage Log management software solutions
Learn to apply best practices and optimize your operations.
Linux administrators should use syslog and systemd-journald together for smart log analysis. But there are also open source log management tools to consider. Continue Reading
ISSA founder Sandra M. Lambert discusses how mounting threats drive information security changes, and why data protection is a competitive advantage. Continue Reading
Database activity monitoring (DAM) systems monitor and record activity in a database and then generate alerts for anything unusual. Continue Reading
Problem Solve Log management software solutions Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Log management software can play a vital role in data security and assuring IT accountability. Looking to start or advance your program? Learn how to handle your logs. Continue Reading
As more companies deploy security information and event management tools, as well as log management solutions, it's time to take a look at the regulations that apply to logging. Continue Reading
Significant due diligence is necessary before an SIEM system will improve regulatory compliance management. Learn the right questions to ask. Continue Reading