IT Security

Visit:

How to leverage SIEM to meet the GDPR’s requirements

Today’s businesses run on data. From getting customer information for payment, processing employee information for payroll, using publicly available data for targeted advertising, to tracking people’s behavior for marketing, data has become the power center of organizations. But with this …

IT Security 3 min read

Cyberattacks are coming—is your firewall ready?

In HBO’s hit series Game of Thrones, the Seven Kingdoms had the Wall to keep out White Walkers, and for many generations, it did exactly that. But even the strongest fortifications can fall flat if improperly managed; like the Wall …

firewallanalyzer 3 min read

Learn how to audit and secure your SQL and IIS servers

Virtually every business today depends on databases and web servers for daily operations. Since these business-critical applications deal with sensitive data, keeping them secure is a major priority—as a security professional, you need to carefully evaluate and implement security measures …

IT Security 1 min read

Adopting a SIEM solution, Part 2: What should you consider when choosing a SIEM tool?

What should you consider when choosing a SIEM tool.

In part one of this two-part series, we discussed why organizations should adopt a SIEM solution to ensure network security. In this second part, we’ll be demystifying the critical capabilities of SIEM tools and show you what to consider …

EventLogAnalyzer 3 min read

Adopting a SIEM solution, Part 1: Why choose SIEM?

Security threats are on the rise and hackers’ attack methods are becoming more sophisticated each day.

According to the recent Verizon Data Breach Report, “Sixty-eight percent of breaches took months or longer to discover, even though eighty-seven percent of the

IT Security 2 min read

Is global expansion crippling your hold on network security?

Globalization and foreign investments have completely changed the way enterprises are run today. Enterprises are expanding geographically to diversify their risk portfolio, but this expansion hasn’t been linear. From mergers to buyouts, today’s enterprises have endless possibilities, which translates into …

firewallanalyzer 2 min read

Free webinar on setting up critical security alerts in your environment 

Every security team relies on security alerts as indicators of compromise (IOCs). Effectively detecting and responding to threats is a crucial aspect of several regulatory mandates and is fundamental in mitigating data breaches.

Configuring security alerts requires some considerations, such …

IT Security 1 min read

Active Directory and IT security seminars are back in the US this June

Get ready, America. ManageEngine is heading back to the US for another round of seminars on Active Directory management and IT security. After circling the globe for our 2018 Active Directory World Tour, we’re excited to return to the East …

IT Security 1 min read

Are you GDPR ready? 

There’s no doubt that the General Data Protection Regulation (GDPR) is one of the most highly anticipated regulatory mandates of the last decade. With May 25—the deadline to comply with the GDPR—just around the corner, you have less than 30 …

EventLogAnalyzer 2 min read

Ransomware attacks continue to rise in 2018

It’s official. Ransomware isn’t just one of the most common types of malware, it is the most prevalent malware used in cyberattacks according to the 2018 Verizon Data Breach Investigations Report (DBIR). This report found that of the data breaches …

IT Security 2 min read