IT Security | January 24, 2018Webinar: How to manage access to personal data under the GDPR One of the GDPR's most important security requirements is that organizations must deploy...
IT Security | January 15, 2018How ISO 27001 helps you comply with the GDPR ISO 27001 is a set of information security best practices designed to help organizations...
IT Security | November 29, 2017Uber's latest data breach drives home GDPR lessons After a relatively quick rise, the entire Uber empire is at risk of falling apart. Uber...
EventLog Analyzer | August 28, 2017Getting to know the GDPR: The technical and organizational measures Before we jump into the third part of this GDPR blog series, let's take a moment to think...
IT Security | August 1, 2017The GDPR: Requirements pertaining to data collection Welcome to part two in a four part blog series about the European Union's GDPR. In our...
IT Security | July 3, 2017Protecting against Petya and other ransomware As a security professional, which do you fear more: 1) explaining to your boss or CEO that...
IT Security | May 31, 2017Brace yourself—the GDPR is on the way Are you ready for May 25, 2018? A little less than a year from now, the European Union...
IT Security | March 20, 2017Breaking SIEM and network security stereotypes Whenever we see the word SIEM, we can't help but picture something really complex—a...
IT Security | September 19, 2016The word's out: We're in the Gartner Magic Quadrant. ManageEngine's integrated SIEM solution, Log360, made it to the Gartner's Magic Quadrant...
OpManager | October 30, 2014OpManager Adds SIEM Plug-in: Integrate Your Data Center Security and Performance Management Security threats are on the rise.Needless to say, the impact of security breaches has...