Evaluate Weigh the pros and cons of technologies, products and projects you are considering.

Evaluating cloud log and event management providers

Cloud providers are expanding their log and event management offerings to meet enterprise needs. Expert Dave Shackleford discusses the changes in the CSP marketplace and details five of today's vendors to consider during evaluation.

FROM THE SECURITY SCHOOL:

Solving enterprise cloud security challenges: In-house or CSPs?

SECURITY SCHOOL SECTIONS

  1. Learning links
  2. Quiz
+ Show More

Enterprises today are looking to the cloud for assistance with manual, time-consuming tasks that they just don't have the resources or expertise to handle in house. This is especially true when it comes to log and event management.

In this podcast, cloud security expert Dave Shackleford discusses the changes occurring in the cloud provider marketplace that are helping organizations and security teams get the information they need to successfully perform log and event management.

Listen in to learn more about five of today's cloud providers -- from the well-known Amazon CloudTrail to lesser-known Apprenda -- and uncover truths about their log and event management offerings to keep in mind when evaluating potential vendors and their services. 

 About the author:
Dave Shackleford is the owner and principal consultant of Voodoo Security LLC; lead faculty at IANS; and a SANS analyst, senior instructor and course author. He has consulted with hundreds of organizations in the areas of security, regulatory compliance, and network architecture and engineering, and is a VMware vExpert with extensive experience designing and configuring secure virtualized infrastructures.

Next Steps

Learn more about logging in the cloud and tackling the challenges of security incident management in the cloud.

This was last published in November 2014

PRO+

Content

Find more PRO+ content and other member only offers, here.

Security School

Solving enterprise cloud security challenges: In-house or CSPs?

SECURITY SCHOOL SECTIONS

  1. Learning links
  2. Quiz

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchSecurity

  • Passive Python Network Mapping

    In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing your devices against ...

  • Protecting Patient Information

    In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data ...

  • Mobile Security and Privacy

    In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity ...

SearchCloudComputing

SearchAWS

SearchCloudApplications

SearchServerVirtualization

SearchVMware

ComputerWeekly

Close