Virtually every business today depends on databases and web servers for daily operations. Since these business-critical applications deal with sensitive data, keeping them secure is a major priority—as a security...
Adopting a SIEM solution, Part 2: What should you consider when choosing a SIEM tool?
In part one of this two-part series, we discussed why organizations should adopt a SIEM solution to ensure network security. In this second part, we’ll be demystifying the critical capabilities of SIEM tools and...
Adopting a SIEM solution, Part 1: Why choose SIEM?
Security threats are on the rise and hackers’ attack methods are becoming more sophisticated each day. According to the recent Verizon Data Breach Report, “Sixty-eight...
Free webinar on setting up critical security alerts in your environment
Every security team relies on security alerts as indicators of compromise (IOCs). Effectively detecting and responding to threats is a crucial aspect of several regulatory mandates and is fundamental in mitigating data...
Active Directory and IT security seminars are back in the US this June
Get ready, America. ManageEngine is heading back to the US for another round of seminars on Active Directory management and IT security. After circling the globe for our 2018...
Are you GDPR ready?
There’s no doubt that the General Data Protection Regulation (GDPR) is one of the most highly anticipated regulatory mandates of the last decade. With May 25—the deadline...
Ransomware attacks continue to rise in 2018
It’s official. Ransomware isn’t just one of the most common types of malware, it is the most prevalent malware used in cyberattacks according to the 2018 Verizon...
Train to be a SIEM scholar with our Log360 certification program
Starting April 25th, we’re hosting a free, four-part training program on security information and event management (SIEM). We’re excited to bring you this training for two...
Connecting the logs with event correlation
Starting with the basics Security information and event management (SIEM) helps with managing and analyzing the vast amount of log information generated by networks. Of all the capabilities of SIEM, event correlation...