{"id":1586,"date":"2009-12-16T00:00:00","date_gmt":"2009-12-16T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2009\/12\/16\/loglogic-releases-version-4-9-of-its-log-management-software\/"},"modified":"2021-12-30T11:39:39","modified_gmt":"2021-12-30T11:39:39","slug":"loglogic-releases-version-4-9-of-its-log-management-software","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2009\/12\/16\/loglogic-releases-version-4-9-of-its-log-management-software\/","title":{"rendered":"LogLogic releases version 4.9 of its log management software"},"content":{"rendered":"<p>Version 4.9 contains more than 40 new features, including built-in support for direct connectivity to Fibre Channel SAN environments without additional gear or appliances and new device management capabilities that provide more system operation controls.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Gary Hemminger, vice president of product management at LogLogic, said: &#8220;With LogLogic 4.9, LogLogic continues to set the pace for the log management market.&#8221;<\/p>\n<p>As evidenced by our recently granted patent for the storage of raw log data, LogLogic strives to continually innovate and deliver log management solutions that meet the changing IT environments that handle big data and new cloud computing architectures.&#8221;<\/p>\n<p>http:\/\/www.scmagazineuk.com\/loglogic-releases-version-49-of-its-log-management-software\/article\/159703\/<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1586","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1586","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1586"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1586\/revisions"}],"predecessor-version":[{"id":4073,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1586\/revisions\/4073"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1586"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1586"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1586"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}