Choosing the right security information management solution

Choosing the right security information management solution
Choosing the right security information management solution

Date: Tuesday, June 23, 2009
Time: 2:00 p.m. EST/11:00 a.m. PST

Click here to register for FREE
 
Whether you're considering a security information management (SIM) solution to comply with regulations, such as PCI, SOX, GLBA, NERC CIP, FISMA and HIPAA, or attempting to simplify the collection and management of log and event data, or trying to increase your overall information security posture, or all of the above, there are some key factors to consider.

John Kindervag, senior analyst at Forrester, on the heels of publishing his latest report, "Market Overview: Security Information Management (SIM)," will share his findings on how SIM solutions have evolved and offer specific guidance on what to consider when selecting a SIM for your organization.

Additionally, Chris Petersen, CTO/co-founder, LogRhythm, will discuss how integrating log and event management, file integrity monitoring, and endpoint monitoring and control can help simplify and automate compliance while enhancing visibility and security.

Featured speakers:
Chris Petersen,
CEO & co-founder, LogRhythm
John Kindervag, senior analyst, Forrester


Sponsored by:   


More in Vendor Webcasts

Why NAC? Why now?

Why are so many enterprises rushing to implement network access control (NAC) now? Watch this webcast to learn about the many uses of NAC.

Security Based on Trust, Not Fear

Security Based on Trust, Not Fear

Trust is essential for building a sustainable business. Security is essential for building trust. To build that trust in electronic networks, security needs to be built into a suitable framework, ...

Unknown Targeted Attacks - Stopping malware at the endpoint

Unknown Targeted Attacks - Stopping malware at the ...

The threat of Targeted Persistent Attacks (TPAs) continues to grow and nearly every day there is another headline about an organization being breached and critical data stolen. Organizations must ask ...