Adopting a SIEM solution, Part 2: What should you consider when choosing a SIEM tool?

What should you consider when choosing a SIEM tool.

In part one of this two-part series, we discussed why organizations should adopt a SIEM solution to ensure network security. In this second part, we’ll be demystifying the critical capabilities of SIEM tools and show you what to consider …

EventLogAnalyzer 3 min read Read

Are you GDPR ready? 

There’s no doubt that the General Data Protection Regulation (GDPR) is one of the most highly anticipated regulatory mandates of the last decade. With May 25—the deadline to comply with the GDPR—just around the corner, you have less than 30 …

EventLogAnalyzer 2 min read Read

Connecting the logs with event correlation

Starting with the basics

Security information and event management (SIEM) helps with managing and analyzing the vast amount of log information generated by networks. Of all the capabilities of SIEM, event correlation is the most powerful. This technique analyzes log …

EventLogAnalyzer 2 min read Read

Talk to our experts about the essentials of log management

Log management is a pillar of security information and event management (SIEM), and is critical to any organization’s security strategy. Logs document every event that occurs on your network, and therefore have the power to inform you about various security …

EventLogAnalyzer 2 min read Read

Let’s talk about STIX, TAXII, and threat intelligence

In terms of collaboration, Structured Threat Information eXpression (STIX) and Trusted Automated eXchange of Indicator Information (TAXII) represent a revolution in the security industry. These protocols transformed the field of threat intelligence from a fragmented collection of information to a …

EventLogAnalyzer 2 min read Read

Getting to know the GDPR: The technical and organizational measures

Before we jump into the third part of this GDPR blog serieslet’s take a moment to think about a few questions. Such aswhy are compliance mandates necessary? Are they framed to just prevent data breaches?

EventLogAnalyzer 2 min read Read

Could adding devices for log collection be any easier?

In December, we released EventLog Analyzer 11.3, which automatically discovers Windows devices from Active Directory and workgroups. This greatly simplifies the process of configuring Windows devices for log collection.

In our release last month, we built on this idea

EventLogAnalyzer 1 min read Read

Three ways EventLog Analyzer enhances SIEM usability

When people talk about SIEM, they don’t usually focus on usability. Vendors tend to focus strictly on log processing capabilities. To be fair, you want your SIEM solution to have cutting edge threat mitigation features. But at the same time,

EventLogAnalyzer 2 min read Read

How EventLog Analyzer simplifies log searches

Log data can be massive even in small organizations. Many of these logs might just be routine messages that don’t concern you, but others contain data that is critical to your network’s security. You want your security information

EventLogAnalyzer 2 min read Read