Leveraging Logs, Info & Events: 3 Use Cases for All that Data

Presented by

Derek E. Brink, VP & Research Fellow for IT Security, Aberdeen Group

About this talk

Enterprises today are doing their best to address three simultaneous objectives regarding their IT infrastructure: to enhance security, to achieve and sustain regulatory compliance, and to improve the efficiency and cost-effectiveness of their ongoing operations. This presentation presents highlights from the March 2009 Aberdeen report that describes how Best-in-Class companies are successfully leveraging security-related logs, information and events to derive more value from the complex IT environments and services that are the foundations for running and growing their business.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (38)
Subscribers (1208)
What separates "Best-in-Class" (top 20%) organizations from their "Industry Average" (middle 50%) and "Laggard" (bottom 30%) counterparts when it comes to various topics in IT Security? Aberdeen's unique, fact-based approach to market research provides a framework for end-user organizations to benchmark their own strategies, capabilities and use of enabling technologies against companies with top performance. Areas of coverage in Aberdeen's IT Security practice include topics in Identities and Access, Data Protection, IT Infrastructure Security (including Endpoints, Delivery Platforms, Applications and Databases, Networks, and Storage), Physical Infrastructure Security, Policies, and Security GRC (Governance, Risk Management, and Compliance). Complimentary access is provided to the full benchmark research reports, for a limited time after initial publication.