Leveraging Logs, Information and Events

Presented by

Derek Brink, Aberdeen Group, VP & Research Fellow for IT Security

About this talk

Companies of all sizes are trying to make sense of the incredible volume of data that is being generated by their computing infrastructure and their existing security solutions. Much like the children ice-skating game of "crack the whip", Aberdeen's research indicates that closing the performance gap between leaders and laggards in the front-end – i.e., collecting and managing the data (log management) – helps to accelerate the progress needed in the back-end – i.e., interpreting the data and taking action (security information and event management). Before (or after) the presentation, individuals interested in comparing their own organization's strategies, capabilities and use of technologies with those of the Best-in-Class (top 20%) as seen in Aberdeen's benchmark research are invited to visit a complimentary, easy-to-use online assessment tool at http://assessment.aberdeen.com/BF3G7hKBmi/index.aspx .

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (38)
Subscribers (1208)
What separates "Best-in-Class" (top 20%) organizations from their "Industry Average" (middle 50%) and "Laggard" (bottom 30%) counterparts when it comes to various topics in IT Security? Aberdeen's unique, fact-based approach to market research provides a framework for end-user organizations to benchmark their own strategies, capabilities and use of enabling technologies against companies with top performance. Areas of coverage in Aberdeen's IT Security practice include topics in Identities and Access, Data Protection, IT Infrastructure Security (including Endpoints, Delivery Platforms, Applications and Databases, Networks, and Storage), Physical Infrastructure Security, Policies, and Security GRC (Governance, Risk Management, and Compliance). Complimentary access is provided to the full benchmark research reports, for a limited time after initial publication.