It’s that time of the year again when as the leaves fall, we brace ourselves for copious amounts of pumpkin in our diet and the possibility of running into a monster on an evening stroll. This Halloween, tell us what…
Looking beyond Windows part 2: Application log management
Earlier, we discussed how effective syslog management can improve your network’s security. However, log monitoring doesn’t end there. Your business runs on applications, whose log data must also be monitored to reinforce security. Applications include web servers, …
Looking beyond Windows part 1: Syslog management
Network security management is about more than just your Windows machines. You probably already know that. But did you know that when it comes to combating security breaches, you need to trace network intrusions at the peripheral device level? …
Protective, GPG13-Compliant Monitoring Using EventLog Analyzer
The journey to a thousand IT problems begins with a single compliance lapse. Yes, this is the first time you are hearing it! So, tell us how often you’ve walked straight into trouble because you underestimated the importance of …

Solving a Cyber Crime Case Like Sherlock Holmes
IT security managers lay a lot of emphasis on conducting log forensics investigations. According to the SANS 2013 Digital Forensics Survey, 57% of the respondents said that they conduct forensic investigations to “find and investigate incidents as they are …

Combat Advanced Cyber Attacks With Shared Security Intelligence
(Originally published in Cyber Defense Magazine, Black Hat special edition)
In this information age, even the mightiest of enterprises and governments across the globe are worried about cyber-attacks. Not a single day passes by without a story about a …
IT Security and Auditing Framework – A Glass Half Full or Half Empty?
Log Management, Compliance Reporting and SIEM
Corporate islands with no connectivity to the external world and/or employees seeking permission to share company critical information with an outsider are not options that ensure protection from information thefts. Not a day goes …

ManageEngine’s EventLog Analyzer Advances the Cloud with ActiveState Stackato
The cloud, once known as the future of IT, is now part of modern IT infrastructure. With the growing acceptance of BYOD and employees soliciting critical business-service access on the move, the cloud is ideally suited to balancing these current …