SlideShare is now on Android. 15 million presentations at your fingertips.  Get the app

×
  • Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
 

Log Analysis Across System Boundaries for Security, Compliance, and Operations

by Principal at Security Warrior Consulting on Nov 03, 2009

  • 928 views

This article covers the importance of utilizing a cross-platform log management approach rather than a siloed approach to aggregating and reviewing logs for easier security and compliance ...

This article covers the importance of utilizing a cross-platform log management approach rather than a siloed approach to aggregating and reviewing logs for easier security and compliance initiatives.

Statistics

Views

Total Views
928
Views on SlideShare
924
Embed Views
4

Actions

Likes
0
Downloads
0
Comments
0

1 Embed 4

http://www.lmodules.com 4

Accessibility

Categories

Upload Details

Uploaded via SlideShare as Microsoft Word

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
Post Comment
Edit your comment

Log Analysis Across System Boundaries for Security, Compliance, and Operations Log Analysis Across System Boundaries for Security, Compliance, and Operations Document Transcript