Presentation: Before You SIM: A look at central log collection DOs and DON’Ts

A discussion of SIM (Security Information Management) technology, what it is, and how it might or might not be helpful to an organization. Also covered is: determining requirements, vendor selection, implementation, and validation.

PDF

Updated: