Hackers leave tracks—buried within log files throughout the IT environment. Finding them requires capturing log data from a wide variety of sources, correlating, and analyzing it to spot the telltale signs of an attack. In this in-depth review, Dave Shackleford of SANS Institute takes HP ArcSight Logger 6 for a test drive to see how security analysts can use it to monitor their environments and respond to incidents.
Read the report to learn:
• How easy it is to customize the dashboard to meet your needs
• How standard displays and free-text search lets analysts drill down into suspicious behavior
• How easy is it to produce standard and custom reports