Best Practices for Enterprise Log Management

  • LANGUAGE: English DATE: Thursday, September 30, 2010 TIME: 15:00 CEST, 1pm UTC, 9am EDT
Upcoming Webinars

Not only since cloud computing has become a hype, traditional perimeters have been more and more disappearing. Managing risks and securing compliance in such "cloudy" environments has become a critical priority. At the same time, an ever increasing number of different systems and devices create floods of IT events and monitoring those events and find out those in real time, which indicate a threat. Managing logs therefore has become a complex task. Join us in this webinar to discuss best practices for log management.

Key Topics for this webinar:
  • Increasing pressure from regulatory compliance, professionalized external attacks, and the increasing complexity of IT environments require a consolidated, close to real-time overview of logs to mitigate risks and to support automated, efficient management of IT infrastructures.
  • Having high-level policies and controls is important – but if you are not able to drill down to the details, you can’t prove what is shown at the top. Log management provides the details you need.
  • Log management as one foundational element in GRC strategies which span all levels – from business to the technical systems.
  • Missing standardization requires tools which enable the easy consolidation and aggregation of different logs.

Efficiently Managing Risks and Simplifying Regulatory Compliance in Hybrid Environments

Martin Kuppinger, Kuppinger Cole
  • Better protecting customer and enterprise information against new threats
  • Leveraging your current infrastructure to increase efficiency and minimize capex
  • Defining a strong and cloud-proof security foundation to manage risk, comply with regulations and reduce overall complexity
  • IT Market Landscape and Dynamics

A Proactive Approach to Risk Management

Pascal Oetiker, Novell
  • Where are the potentials to simplify risk management?
  • Log Management Best Practices

Speakers

Pascal Oetiker is Novell's Security Management sales lead for the Europe, Middle-East and Africa (EMEA) region. Oetiker has over 13 years of experience in the information security market, having worked for companies like McAfee/Network Associates, e-Security and Novell in consulting, pre-sales,...


Gold Sponsor

Today's enterprises need to protect their IT infrastructures from information theft and comply with regulations while ensuring users' privacy. Security and Identity solutions offer network security and identity management that help you secure your information assets without reducing operational effectiveness or compromising new opportunities. Novell can help you keep the bad guys out and let the good guys in without limiting your ability to do business in the real world.

Watch now

Downloads

Webinar presentation, Martin Kuppinger

Webcast download

Popular Webcasts

Next Webinar

Webinar

KuppingerCole’s List of Leading Vendors in the IDaaS Access Management Market

Identity-as-a-Service Access Management (IDaaS AM) has emerged as one of the fastest-growing markets of IAM, characterized by cloud-based delivery of traditional IAM services. KuppingerCole estimates the global IDaaS market will continue to grow at a CAGR of 24% in 2019.

Next Conference

Conference

Blockchain Enterprise Days 2019

Blockchain is still on everyone’s lips and the 2019 can be the year when large enterprises finally embrace the distributed ledger technology. KuppingerCole's inaugural blockchain-themed event will go beyond the hype and will present you real use cases and applications for your enterprise. Blockchain Enterprise Days (#BeDays19) will take place on September 18-19, 2019 in Frankfurt, Germany.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00