flow-image
Pure Storage

Data Storage Considerations for Security Analytics

This resource is published by Pure Storage

pattern

Log analytics has taken increasing importance over the years. In particular, applications that use log analytics have provided key new capabilities for security operations teams within IT organizations. The many log analytics use cases can all benefit from scalable, performant data delivery through a modern storage platform. Security analytics in particular have special considerations that can be met with effective planning and deployment of data storage infrastructure.

This excerpt from O'Reillys "Understanding Log Analytics" a concise overview of the security analytics use case. Additionally, it provides a reference for performance and scalability considerations, and planning that aids the deployment and operation of data storage for security analytics.

pattern

Related categories
Hardware, Server, Storage, Software, Applications, Network, Compliance, Firewall, Event Management, Malware, ERP, Firewall, Server, Storage, Email, Spam, Storage, Backups, Data Storage, SAN, Storage Hardware, Storage Systems, Cloud, Analytics, Predictive Analytics, Machine Learning, Machine Data, AIM, Artificial Intelligence, Internet of Things (IoT), IOT

 

box-icon-download
Download Now

Required fields*

Please agree to the conditions

By requesting this resource you agree to our terms of use. All data is protected by our Privacy Notice. If you have any further questions please email dataprotection@headleymedia.com.