Slides: Security Log Analytics: Finding and Stopping Bad Guys at Scale

Malware, theft, espionage, and other cybersecurity threats are the bane of digital business. Bad guys get better each year at stealing money, customer identities, and secrets. To reduce their risks, enterprises need to sharpen their surveillance.

Security log analytics can help. It enables security operations (SecOps) teams to improve the cost and scale at which they predict, prevent, and mitigate rising threats. These tools study events such as user logins, password changes, and firewall alerts to identify, assess, and respond to security threats. New low-footprint indexing tools make security log analytics more scalable and flexible for cost-conscious enterprises.

Join this webinar to learn:

  • Adoption drivers, challenges, requirements, and benefits of security log analytics
  • Primary use cases for security log analytics
  • Why security log analytics offers a scalable and cost-effective alternative to security information and event management (SIEM) tools

Sponsor: ChaosSearch

Kevin Petrie

Kevin is the VP of Research at Eckerson Group, where he manages the research agenda and writes about topics such as data integration, data observability, machine learning, and cloud data...

More About Kevin Petrie