It’s that time of the year again when as the leaves fall, we brace ourselves for copious amounts of pumpkin in our diet and the...
Looking beyond Windows part 2: Application log management
Earlier, we discussed how effective syslog management can improve your network’s security. However, log monitoring doesn’t end there. Your business runs on applications, whose log data...
Looking beyond Windows part 1: Syslog management
Network security management is about more than just your Windows machines. You probably already know that. But did you know that when it comes to...
Protective, GPG13-Compliant Monitoring Using EventLog Analyzer
The journey to a thousand IT problems begins with a single compliance lapse. Yes, this is the first time you are hearing it! So, tell...
Solving a Cyber Crime Case Like Sherlock Holmes
IT security managers lay a lot of emphasis on conducting log forensics investigations. According to the SANS 2013 Digital Forensics Survey, 57% of the respondents...
8 Log Management Habits of Highly Effective IT Security Managers
In today’s business environment, data is the source that drives organizations in the proper direction. Data enables planning, forecasting, and strategy. For example, retailers rely...
Combat Advanced Cyber Attacks With Shared Security Intelligence
(Originally published in Cyber Defense Magazine, Black Hat special edition) In this information age, even the mightiest of enterprises and governments across the globe are worried...
IT Security and Auditing Framework – A Glass Half Full or Half Empty?
Log Management, Compliance Reporting and SIEM Corporate islands with no connectivity to the external world and/or employees seeking permission to share company critical information with...
ManageEngine’s EventLog Analyzer Advances the Cloud with ActiveState Stackato
The cloud, once known as the future of IT, is now part of modern IT infrastructure. With the growing acceptance of BYOD and employees soliciting...