In part one of this two-part series, we discussed why organizations should adopt a SIEM solution to ensure network security. In this second part, we’ll be demystifying the critical capabilities of SIEM tools and...
Are you GDPR ready?
There’s no doubt that the General Data Protection Regulation (GDPR) is one of the most highly anticipated regulatory mandates of the last decade. With May 25—the deadline...
Connecting the logs with event correlation
Starting with the basics Security information and event management (SIEM) helps with managing and analyzing the vast amount of log information generated by networks. Of all the capabilities of SIEM, event correlation...
Talk to our experts about the essentials of log management
Log management is a pillar of security information and event management (SIEM), and is critical to any organization’s security strategy. Logs document every event that occurs on your...
Let’s talk about STIX, TAXII, and threat intelligence
In terms of collaboration, Structured Threat Information eXpression (STIX) and Trusted Automated eXchange of Indicator Information (TAXII) represent a revolution in the security industry. These protocols transformed...
Getting to know the GDPR: The technical and organizational measures
Before we jump into the third part of this GDPR blog series, let’s take a moment to think about a few questions. Such as, why are compliance mandates necessary? Are they framed to just prevent data breaches? Are...
Could adding devices for log collection be any easier?
In December, we released EventLog Analyzer 11.3, which automatically discovers Windows devices from Active Directory and workgroups. This greatly simplifies the process of configuring Windows...
Three ways EventLog Analyzer enhances SIEM usability
When people talk about SIEM, they don’t usually focus on usability. Vendors tend to focus strictly on log processing capabilities. To be fair, you want...
How EventLog Analyzer simplifies log searches
Log data can be massive even in small organizations. Many of these logs might just be routine messages that don’t concern you, but others contain...