Event Log Management White Papers

Read the latest white papers from industry experts New Net Technologies. We provide comprehensive information on IT security and compliance.

Information is power when it comes to guarding your IT system against cyber-attacks. Click on a link below to find out how event log management can help you to gather logs and analyse them for suspicious activity.

Security is a complex area - there are many types of cyber threat to deal with and each requires a different set of tactics and capabilities. Whether you need to protect your organizations confidential data - be it intellectual property or your customers’ personal information - or fend off malicious attacks and acts of internet vandalism, the threats are out there and getting increasingly tough to defend against.

Getting the balance right between the need to meet your mandatory obligations for PCI DSS, and the imperative of minimizing costs’ of ownership, is a challenge.Section 10.2 of the PCI DSS states “Implement automated audit trails for all system components...” and there are typically two concerns that we always discuss –What is the best way to gather and centralize event logs? What do we need to do with the event logs once we have them stored centrally? (and how will we cope with the volume!?)

NNT Products
USA Offices
New Net Technologies LLC
Naples
Suite #10115, 9128 Strada Place
Naples, Florida, 34108
Atlanta
201 17th Street, Suite 300
Atlanta, Georgia, 30363.

Tel: 1-888-898-0674
email USinfo@nntws.com
UK Office
New Net Technologies LLC
Rivers Lodge
West Common
Harpenden
Hertfordshire
AL5 2JN

Tel: 01582 287310
email UKinfo@nntws.com
Connect
Google+ Linkedin Twitter - Change Tracker Facebook rss feed YouTube
CIS benchmarking SEWP Cybersecurity 500 Sans Institute
Copyright 2017, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.