Event Log Management Articles
Read articles from industry experts New Net Technologies to find out about best practices in keeping your IT systems secure.
Information is power when it comes to guarding your IT system against cyber-attacks. Click on a link below to find out how event log management can help you to gather logs and analyse them for suspicious activity.
Whether you are working from a SANS 20 Security Best Practices approach, or working with an auditor for SOX compliance or QSA for PCI compliance, you will be implementing a logging solution.
Within the FIM technology market there are choices to be made. Agent-based or agentless is the most common choice, but even then there are both SIEM, and ‘pure-play’ FIM, solutions to choose between.
It is well known that Anti-Virus technology is fallible and will continue to be so by design. The landscape (Threatscape?) is always changing and AV systems will typically update their malware signature repositories at least once per day in an attempt to keep up with the new threats that have been isolated since the previous update.