The Business Value of Log Management Best Practices

  • LANGUAGE: English DATE: Wednesday, January 26, 2011 TIME: 3pm (CET), 2pm (UK)
Upcoming Webinars

Although log management recently has been gaining more attention as a key element of any information security strategy, many even large organizations have not yet developed and implemented log management best practices. In this webinar, Kuppinger Cole´s Pricipal Analyst Martin Kuppinger will discuss with you the business value of best practices for log management. Followed by Martin, Pascal Oetiker from Novell will describe his view on how to develop and implement log management best practices.

Due to a consistently tightening framework of legal and governance requirements, and due to a continuous strive for process quality improvements, information extracted from log data is more and more becoming a valuable source not only for IT security departments, but also for HR, the legal department, internal audit, finance, engineering and even (or: first and foremost) marketing and sales.

In this webinar you will learn, how to create additional business value through creating and implementing log management best practices.

  • How to efficiently manage an increasing amount of log data and save storage costs
  • What the best possible approach to log management best practices for your individual situation is
  • How to significantly increase information security and pro-actively avoid damages from new threats
  • Seamlessly include cloud service logs into your enterprise log management

Kuppinger Cole´s Principal Analyst Martin Kuppinger will discuss with you the business value of best practices for log management. Followed by Martin, Pascal Oetiker from Novell will describe his view on how to develop and implement log management best practices.


Speakers

Pascal Oetiker is Novell's Security Management sales lead for the Europe, Middle-East and Africa (EMEA) region. Oetiker has over 13 years of experience in the information security market, having worked for companies like McAfee/Network Associates, e-Security and Novell in consulting, pre-sales,...


Lead Sponsor

Today's enterprises need to protect their IT infrastructures from information theft and comply with regulations while ensuring users' privacy. Security and Identity solutions offer network security and identity management that help you secure your information assets without reducing operational effectiveness or compromising new opportunities. Novell can help you keep the bad guys out and let the good guys in without limiting your ability to do business in the real world.

Watch now

Downloads

Presentation, Martin Kuppinger

Presentation, Novell

Video download

Popular Videos

Next Webinar

Webinar

Endpoint Protection Made Easy With Privilege Management

Endpoint detection and response (EDR) solutions monitor endpoint and network events and record the information in a central database. There, the information is subjected to further analysis, detection, investigation, reporting, and alerting. While EDR solutions may be a good start to protect endpoints, they are by no means sufficient. Instead, Endpoint Privilege Management (EPM) solutions must be integrated to protect the systems from within.

Next Conference

Congress

European Identity & Cloud Conference 2021

Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00