0 Replies Latest reply on Nov 3, 2014 4:20 PM by nicole pauls

    Do you use logs for security and compliance (and maybe IT ops), especially with LEM/Kiwi/NPM/SAM? Help us out for thwack points and an amazon.com gift card!

    nicole pauls

      NOTE: We closed the below survey, thanks to everyone for your feedback! If you missed out but have thoughts you'd like to share, let me know and we'll find a way to squeeze you in somewhere

       

      Hey everyone,

       

      We're doing some research into how you use log data for security and compliance, and how that overlaps with how you use log data for IT operations. If you use LEM, Kiwi, or NPM/SAM, or really even a third party product or more than one product, for security/compliance and/or IT operations with log data, check out our survey. We're especially interested in people who can speak to the security point of view - if that's not you but someone in your org does that, pass it on!

       

      As a thanks to those who complete the survey, we'll give you a $10 amazon.com gift card, 1000 thwack points, and you'll be entered into a drawing for a $500 gift card.

       

      <removed survey link>

       

      Thanks!