Log management stories
![Story image](../../../../../uploads/story/2024/07/06/preview_IMG_0013.webp)
David Galloreese joins Datadog as new Chief People Officer
This month
#
digital transformation
#
siem
#
cloud security
David Galloreese, with over 15 years of HR expertise, joins Datadog as Chief People Officer, aiming to drive growth and strengthen the company's talent acquisition and development efforts.
![Story image](../../../../../uploads/story/2024/05/14/preview_img-W2uWO1hCWUb58rVvedrkhYIV.webp)
Exabeam unveils industry-first 'Investigation Timelines' tool
Tue, 14th May 2024
#
siem
#
advanced persistent threat protection
#
productivity
Exabeam launches an industry-first Investigation Timelines tool to aid security teams with instant chronological event visualisations.
![Story image](../../../../../uploads/story/2024/04/10/preview_img-ty31SDvb9aD1ISTaTPVf3l88.webp)
SentinelOne announces Purple AI for enhanced cybersecurity efficiency
Wed, 10th Apr 2024
#
siem
#
advanced persistent threat protection
#
ai
SentinelOne introduces Purple AI, an AI-driven security platform transforming natural language into structured queries, aimed at increasing enterprise cybersecurity efficiency.
![Story image](../../../../../uploads/story/2024/03/07/preview_img-9FWbX0lLNFLQ7Ci6uKiFikvK.webp)
Multicloud complexity challenging traditional AIOps
Fri, 8th Mar 2024
#
martech
#
cx
#
advanced persistent threat protection
Organisations are turning to multicloud and cloud-native architectures, yet struggle with managing them due to overwhelming data and increasing complexity.
![Story image](../../../../../uploads/story/2024/01/29/preview_img-iDpmN4MJI1bsLRn4tfhhN1Xk.webp)
ExtraHop expands partnership with CrowdStrike for enhanced cloud security
Mon, 29th Jan 2024
#
siem
#
ai security
#
ndr
ExtraHop expands its partnership with CrowdStrike, enabling Reveal(x) customers to store records in CrowdStrike Falcon LogScale as businesses seek efficient security tools amidst shifting cybersecurity threats.
![Story image](../../../../../uploads/story/2023/04/04/preview_GettyImages-1334595508.webp)
LogRhythm unveils new capabilities in its security portfolio
Tue, 4th Apr 2023
#
siem
#
advanced persistent threat protection
#
it automation
LogRhythm enriches the security analyst experience with a streamlined collection of log sources, new analytics capabilities, and unlimited upgrade services.
![Story image](../../../../../uploads/story/2022/10/26/preview_GettyImages-1413997789.webp)
How log management can give Asian businesses a competitive edge
Wed, 26th Oct 2022
#
devops
#
data analytics
#
martech
An integral part of DevOps and IT practices, logs are a type of telemetry data; recording everything that happens in an application, network, or server.
![Story image](../../../../../uploads/story/2022/08/18/preview_GettyImages-1244482898.webp)
Arcion extends data replication platform with new capabilities
Thu, 18th Aug 2022
#
oracle
#
db
#
cloud services
Arcion announces major new product release, extending data replication platform's capabilities and offering faster log extraction for Oracle users.
![Story image](../../../../../uploads/story/2021/12/15/preview_GettyImages-1007981330.webp)
New algorithm looks to help streamline data restoration of event logs
Wed, 15th Dec 2021
#
martech
#
data analytics
#
planning
New tertiary research out of Korea has led to the development of an algorithm capable of streamlining the restoration of event data logs.
![Story image](../../../../../uploads/story/2019/02/14/preview_GettyImages-943067460.webp)
Interview: Why log management is crucial to modern business
Fri, 8th Mar 2019
#
siem
#
iam
#
one identity
One Identity's IT veteran Balázs Scheidler shares his insights on log management's history and where it's going to next.
![Story image](../../../../../uploads/story/2014/12/05/preview_Virtualisation-provides-single-point-of-defence.webp)
Virtualisation provides single point of defence.
Thu, 1st Nov 2012
#
virtualisation
#
breach prevention
#
business continuity
Virtualisation renders a single point of defence but comes with unique security challenges, necessitating a robust focus on safeguarding the host system.