IT Security


Help us understand and measure your SOC performance [Survey]

What gets measured gets managed. You probably intuitively sense the truth in that statement, but are you practicing it? Specifically, are you measuring your security operations center’s (SOC) performance?

Measuring the IT security team’s performance has always been subjective. With …

IT Security 2 min read

ManageEngine recognized in Gartner Magic Quadrant for Security Information and Event Management three years in a row

We’re happy to announce that ManageEngine has been positioned in Gartner’s Magic Quadrant for Security Information and Event Management[i] (SIEM) and its Critical Capabilities for Security Information and Event Management[ii] research report for the third consecutive year.


General , IT Security 2 min read

The role of SIEM in PCI DSS compliance

Studies have shown a direct correlation between data breaches and non-compliance. This isn’t to say that compliant companies never get breached, but to reinforce the importance of incident detection and response. Businesses have begun to realize the devastating consequences …

IT Security 2 min read

One expired security certificate leaves millions of smartphones offline

Yes, you read the headline right. And no, this outage isn’t the first of its kind. Ericsson, the Swedish multinational networking and telecommunications company, joins the list of organizations that have caused huge service outages for customers because of one

Key Manager Plus 2 min read

Firewall Analyzer enhancements that fire up your firewall devices

The Firewall Analyzer team is constantly working on enhancements to improve its product offering. Here’s an overview of all the new vendors, log formats, and reports supported by Firewall Analyzer.

1. New supported vendor: F5 BIG-IP Local Traffic Manager

F5 …

firewallanalyzer 3 min read

Industry best practices for endpoint security

Lately, hackers on the lookout for vulnerable systems have kept the IT industry busy. While various OS and software vendors strive to keep their users’ data intact by providing timely updates, manually securing endpoints by applying these updates is challenging …

IT Security 4 min read

Simplifying security auditing, part 6: Compliance and the cloud

In part 5, we looked at auditing your network device logs. A decade ago, security professionals were primarily concerned about network perimeter and endpoint security. While those concerns are still valid, technological advancements have created new scenarios that need …

IT Security 2 min read

Simplifying security auditing, part 5: Detecting network attacks

Anyone trying to access resources in your network needs to interact with your network devices: firewalls, routers, switches, and IDS/IPSs. Each of these devices generate syslogs that contain important security information and must be audited to gain complete visibility into …

IT Security 2 min read

Chrome’s removing the “Secure” label from HTTPS sites—but why? 

Gone are the days when the green “Secure” label stood to distinguish legitimate websites from potentially malicious ones. Shortly after marking all HTTP sites with a “Not Secure” badge earlier this year, Google has now stepped up to remove …

Key Manager Plus 2 min read

Simplifying security auditing, Part 3: Keeping insider threats in check 

Insider threats are on the rise. In fact, both administrators and average employees are among the biggest security threats in an organization. When it comes to security auditing, there are two areas you need to focus on: Active Directory …

IT Security 2 min read