Content

Recession busting: Using logs to beef up IT security

Pat Sueltz, CEO of LogLogic

As the recession continues, cybercrime and data breaches are on the rise—particularly from disgruntled, laid-off employees. According to a recent Symantec study, more than two-thirds of ex-employees have stolen data without the company’s knowledge, while the average data breach cost each company $6.3 million last year. When you look at the risks, it’s obvious that companies need effective security solutions. Meanwhile, tightened IT budgets magnify demand for trimming costs while maintaining strong security.

The problem here is not the technology, but rather, the approach. Historically, enterprises have invested in a variety of separate security solutions: log management, firewalls, security event managers (SIEM), database activity monitoring (DAM), intrusion prevention systems, anti-virus, etc. These all require separate deployments and maintenance costs. They work independently from each other, but as they strive to serve different functions, they also duplicate data collection and intelligence—the result being a lot of unnecessary work.

At the root of many security functions lies a common denominator—the log. Logs contain all the data you need to know about the security of your network and your data. You can capture logs once and use them for a variety of security and business purposes.

A recent report from Aberdeen Group found that best-in-class companies are embracing converged solutions to reduce the total cost of ownership for endpoint systems, while reducing the number of security incidents at the same time. With sound management, you can use the same logs for SIEM, DAM, regulatory compliance, network monitoring, and more. It all starts with the lowly log.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.