Log management in a silver-lined cloud

Share this article:
January 2009: Surviving a bad economy
January 2009: Surviving a bad economy

Date: Wednesday, April 15, 2009
Time: 2:00 p.m. EST/11:00 a.m. PST

Click here to view on demand

Log management technology has been labeled – often accurately – as complex and expensive. But many organizations face regulatory mandates that require log management. Given today's climate of economic uncertainty, such organizations must find a way to effectively manage log data with a tightening budget. Cloud computing is the answer. In the cloud, organizations can meet the demands of both shrinking budgets and expanding regulations.

Join Randy Rosenbaum and Steve Smith from the Alert Logic product team as they discuss how cloud-based solutions can help you effectively manage logs on a tight budget. In this webinar, you will learn how a cloud-based log management solution provides the following benefits:

  • Easy to buy, deploy, use, and own with no software or hardware to purchase or maintain, no upfront investment required, and everything included in one convenient monthly fee
  • Enables regulatory compliance with automated log data collection and due diligence review as well as immutable, redundant, and secure archival
  • Improves incident response and resolution for security, performance, and availability incidents via quick and easy browser-based access to all historical log data

Featured speakers:
Randy Rosenbaum, CPISM, product marketing manager, Alert Logic
Steve Smith, product manager, Alert Logic

Sponsored by 

AlertLogic's on-demand solutions provide the easiest way to secure networks and comply with policies and regulations by enabling our customers to detect threats, eliminate vulnerabilities and manage log data.

Our on-demand platform utilizes software-as-a-service to deliver the benefits of rapid deployment, zero maintenance and no upfront capital costs. As a result, AlertLogic customers benefit from easy and affordable security and compliance.

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

More in Vendor Webcasts

The impact of endpoint data growth on corporate visibility & compliance

id you know that forty-six percent of IT knows or suspects employees are using their individual, non-IT approved cloud accounts to store corporate data?

Security in the new mobile ecosystem

A recent study, conducted by the Ponemon Institute, and commissioned by Raytheon, has revealed some interesting facts related to the adoption and barriers to mobile device usage in the workplace.

Guidance on migration to SHA-2

Google has advised that Chrome will gradually sunset SHA-1 cryptography, which is used in the signing process of SSL certificates.