Log management and SIEM fundamentals: Comprehensive log collection and auditing

The first step in SIEM is collecting log data. Log data, as we saw in part 1, is what drives any SIEM solution. A SIEM...

IT Security 3 min read Read

Log management and SIEM fundamentals: Getting started

Cyber attacks and network breaches can bring even the largest organizations to their knees. Recently, of course, we had the WannaCry ransomware attack, which not...

IT Security 3 min read Read

Brace yourself—the GDPR is on the way

Are you ready for May 25, 2018? A little less than a year from now, the European Union will implement the General Data Protection Regulation...

IT Security 3 min read Read

Will you survive the certificate war between Google and Symantec? ​

Google recently accused Symantec, one of the most prominent Certificate Authorities (CAs), of violating the trust internet users place in encrypted web communication. In his...

Key Manager Plus 2 min read Read

Kick-starting our free, online Log360 and ADAudit Plus workshop series

Security administrators are obviously concerned about external security threats, but did you know that internal threats can be just as dangerous? Sure you’ve got a...

IT Security 2 min read Read

Could adding devices for log collection be any easier?

In December, we released EventLog Analyzer 11.3, which automatically discovers Windows devices from Active Directory and workgroups. This greatly simplifies the process of configuring Windows...

EventLogAnalyzer 1 min read Read

Breaking SIEM and network security stereotypes

  Whenever we see the word SIEM, we can’t help but picture something really complex—a huge network, a big organization, advanced attacks, and a lot...

IT Security 1 min read Read

Simplified user certificate tracking with Key Manager Plus

Windows Active Directory (AD) is one of the most widely used administrative models among enterprises. User management in AD is smooth when there are only...

Key Manager Plus 2 min read Read