Hey everyone,
We're doing some research into how you use log data for security and compliance, and how that overlaps with how you use log data for IT operations. If you use LEM, Kiwi, or NPM/SAM, or really even a third party product or more than one product, for security/compliance and/or IT operations with log data, check out our survey. We're especially interested in people who can speak to the security point of view - if that's not you but someone in your org does that, pass it on!
As a thanks to those who complete the survey, we'll give you a $10 amazon.com gift card, 1000 thwack points, and you'll be entered into a drawing for a $500 gift card.
Thanks!