In part one of this two-part series, we discussed why organizations should adopt a SIEM solution to ensure network security. In this second part, we’ll be demystifying the critical capabilities of SIEM tools and show you what to consider …

Are you GDPR ready?
There’s no doubt that the General Data Protection Regulation (GDPR) is one of the most highly anticipated regulatory mandates of the last decade. With May 25—the deadline to comply with the GDPR—just around the corner, you have less than 30 …

Connecting the logs with event correlation
Starting with the basics
Security information and event management (SIEM) helps with managing and analyzing the vast amount of log information generated by networks. Of all the capabilities of SIEM, event correlation is the most powerful. This technique analyzes log …

Talk to our experts about the essentials of log management
Log management is a pillar of security information and event management (SIEM), and is critical to any organization’s security strategy. Logs document every event that occurs on your network, and therefore have the power to inform you about various security …

Getting to know the GDPR: The technical and organizational measures
Before we jump into the third part of this GDPR blog series, let’s take a moment to think about a few questions. Such as, why are compliance mandates necessary? Are they framed to just prevent data breaches? …

Could adding devices for log collection be any easier?
In December, we released EventLog Analyzer 11.3, which automatically discovers Windows devices from Active Directory and workgroups. This greatly simplifies the process of configuring Windows devices for log collection.
In our release last month, we built on this idea …
Three ways EventLog Analyzer enhances SIEM usability
When people talk about SIEM, they don’t usually focus on usability. Vendors tend to focus strictly on log processing capabilities. To be fair, you want your SIEM solution to have cutting edge threat mitigation features. But at the same time, …

How EventLog Analyzer simplifies log searches
Log data can be massive even in small organizations. Many of these logs might just be routine messages that don’t concern you, but others contain data that is critical to your network’s security. You want your security information …