Seven Hot Security Management Tools

  • By

    Ericka Chickowski

    | Posted 2010-02-16
  • Email
 
 
 
Previous
No Title
Next
As channel customers struggle to keep up with the endless stream of device logs and security information necessary to adjust infrastructure and procedures to mitigate risk, they're looking to partners to offer them the right solutions and services to do just that. The security information and event management (SIEM) and log management markets offer a plethora of options to choose from. In the last two quarters the channel has seen a number of announcements for new and updated products meant to help customers convert the torrent of security data coming from relevant devices into actionable information. Channel Insider explores some new tools on the market.By Ericka Chickowski
As channel customers struggle to keep up with the endless stream of device logs and security information necessary to adjust infrastructure and procedures to mitigate risk, they're looking to partners to offer them the right solutions and services to do just that. The security information and event management (SIEM) and log management markets offer a plethora of options to choose from. In the last two quarters the channel has seen a number of announcements for new and updated products meant to help customers convert the torrent of security data coming from relevant devices into actionable information. Channel Insider explores some new tools on the market.
 
 
 
 
 

Submit a Comment

Loading Comments...
























 
 
 
 
 
 
 
 
 
Thanks for your registration, follow us on our social networks to keep up-to-date