Halloween contest: What is your biggest fear? Zombies or hackers?

It’s that time of the year again when as the leaves fall, we brace ourselves for copious amounts of pumpkin in our diet and the possibility of running into a monster on an evening stroll. This Halloween, tell us what

EventLogAnalyzer 1 min read Read

Looking beyond Windows part 2: Application log management

Earlier, we discussed how effective syslog management can improve your network’s securityHowever, log monitoring doesn’t end there. Your business runs on applications, whose log data must also be monitored to reinforce security. Applications include web servers,

EventLogAnalyzer 2 min read Read

Looking beyond Windows part 1: Syslog management

Network security management is about more than just your Windows machines. You probably already know that. But did you know that when it comes to combating security breaches, you need to trace network intrusions at the peripheral device level?

EventLogAnalyzer 2 min read Read

Protective, GPG13-Compliant Monitoring Using EventLog Analyzer

The journey to a thousand IT problems begins with a single compliance lapse. Yes, this is the first time you are hearing it! So, tell us how often you’ve walked straight into trouble because you underestimated the importance of

EventLogAnalyzer 3 min read Read

Solving a Cyber Crime Case Like Sherlock Holmes

Solving a Cyber Crime Case like Sherlock HolmesIT security managers lay a lot of emphasis on conducting log forensics investigations. According to the SANS 2013 Digital Forensics Survey, 57% of the respondents said that they conduct forensic investigations to “find and investigate incidents as they are …

EventLogAnalyzer 3 min read Read

8 Log Management Habits of Highly Effective IT Security Managers

blog_sep2014-19In today’s business environment, data is the source that drives organizations in the proper direction. Data enables planning, forecasting, and strategy. For example, retailers rely on customer behavior data to drive more sales, and CEO’s rely of past performance data …

EventLogAnalyzer 5 min read Read

Combat Advanced Cyber Attacks With Shared Security Intelligence

(Originally published in Cyber Defense Magazine, Black Hat special edition)

shared-security-intelligence

​In this information age, even the mightiest of enterprises and governments across the globe are worried about cyber-attacks. Not a single day passes by without a story about a …

EventLogAnalyzer 3 min read Read

IT Security and Auditing Framework – A Glass Half Full or Half Empty?

Log Management, Compliance Reporting and SIEM

Corporate islands with no connectivity to the external world and/or employees seeking permission to share company critical information with an outsider are not options that ensure protection from information thefts. Not a day goes …

EventLogAnalyzer 4 min read Read

ManageEngine’s EventLog Analyzer Advances the Cloud with ActiveState Stackato

The cloud, once known as the future of IT, is now part of modern IT infrastructure. With the growing acceptance of BYOD and employees soliciting critical business-service access on the move, the cloud is ideally suited to balancing these current …

EventLogAnalyzer 2 min read Read