Skip the navigation

Alert Logic White Papers

IT white papers and technology resources for implementing and optimizing IT strategy, enterprise solutions, technology products, and more.

Best practices for facing today's log management challenges

Log management is an organizational requirement that extends beyond simple data collection. Today's compliance regulations demand the ability to collect, analyze and report on all data collected. This whitepaper discusses key best practices to consider when evaluating automated log management solutions.

Sponsor: Alert Logic


Alert Logic: Leader in Forrester Wave evaluation of emerging MSSPs

The numbers show a clear trend: there is a growing consensus among CISOs that outsourcing security services is a viable option. In this paper Forrester shares the results of their 15-criteria evaluation of the top ten emerging players in the MSSP market.

Sponsor: Alert Logic


Protect your brand with Alert Logic PCI DSS compliance solutions

Alert logic's cloud-powered solutions help organizations that process, store or transmit credit card data eliminate the burden of PCI compliance. This product brief outlines Alert Logic's solutions and the unique benefits offered.

Sponsor: Alert Logic


Defense throughout the Vulnerability Life Cycle with Alert Logic Threat and Log Manager

New security threats are emerging all the time, from new forms of malware and web application exploits that target code vulnerabilities to attacks that rely on social engineering. Defending against these risks is an ongoing battle. In response, the array of security technologies available has also grown. While we are familiar with essential defenses such as network firewalls and antivirus software, more sophisticated solutions are harder to evaluate. Intrusion detection, SIEM, Web application firewalls-which are right for your organization, and how do they work together to prevent data breaches, downtime and the business consequences of a successful attack? In this white paper we will discuss how vulnerability assessment, network intrusion detection and log management work together to protect your IT assets. We will do so in the context of the Vulnerability Life Cycle-a model to understand how attackers find and leverage vulnerabilities to attack their targets. In doing so, we will provide insight into how you can use these different technologies to identify attacks, prevent them and recognize and remediate successful attacks.

Sponsor: Alert Logic


State of Cloud Security Report

In a relatively short time, cloud computing, specifically Infrastructure-as a-Service, has shifted from a new but unproven approach to an accepted,
even inevitable, model. Driven by flexibility and efficiency, the question facing most organizations is not whether the cloud is part of their infrastructure plans, but which applications and workloads to move to the cloud and when. But even as the benefits of cloud and hosted models have become apparent, concerns persist about security, and an assumption lingers that the cloud is inherently less secure than an enterprise data center environment.

Sponsor: Alert Logic