EventLog Analyzer is an IT Compliance & Event Log Management Software for SIEM Visit:manageengine.com/products/eventlog/

Privileged User Monitoring and Audit (PUMA)

Privileged Users, like Network Administrators, System Administrators, and Database Administrators all have unrestricted access to all the critical servers, applications, and databases in an enterprise. They have the powers to create or remove user profiles and manage user privileges. Their

EventLogAnalyzer 4 min read

The Perils of Non-Compliance

The word ‘compliance’ has come a long way in the English dictionary. It might have started as yet another addition to the vocabulary, but now the image it conjures up – little would have the people who coined this word

EventLogAnalyzer 2 min read

Why IT Matters

When I was in business school in the late 1990’s, we learned about Total-Factor Productivity (TFP). That’s the factor or coefficient that, when combined with labor and capital, equates to total output. TFP is an intangible, but it is thought

EventLogAnalyzer 3 min read

IT’s New Reality

Jason Hiner over at TechRepublic wrote a blog the other day entitled What the IT department will look like in 2015. He’s got some interesting views: IT departments will be smaller, more decentralized, rely on more consultants, and focus

EventLogAnalyzer 2 min read

A Tale of Two Realities: IT Managers, What’s Keeping You from Adopting New Technologies?

I had a lot of fun talking to Michael Dortch recently. For those of you who don’t know Michael, he’s a charismatic IT analyst who has a great perspective on IT and who likes to share it. The man’s one …

EventLogAnalyzer 2 min read

Lessons from Sony PSN breach

The breach at Sony Play Station Network (PSN) breach creates a lot of doubts in the IT Security manager’s mind. We can take our lessons from the breach. Because it is smarter to learn from others mistakes.


Don’t think

EventLogAnalyzer 2 min read

Is PCI DSS enforcement is only banking companies?

No, PCI DSS compliance may not be limited to Banking and Payment Card companies. It may be enforced for any company handling customer credit card data. You can see now, even Sony PlayStation network is attacked and data thieves have …

EventLogAnalyzer 1 min read

What to Look for in a Log Management Application – Check the Checklist!

T?he current dynamic IT scenario ascertains the importance of security logs because of the rise in hackers activities. The resultant requirement is an event log management tool to detect security issues within your network.

EventLogAnalyzer 2 min read

Answering Compliance Queries – IT Compliance from Auditor’s and Entrepreneur’s Point of View

Why compliance audits?

Let us not narrow our perception to the IT systems alone…but with IT infrastructure as a broad term. Auditing has a purpose. Tracking activities within the systems is important for system security

EventLogAnalyzer 3 min read

“Who will guard the guards”?

Russel, a chief security officer for a renowned enterprise is one of EventLog Analyzer customers.  Recently we had a quick review of his EventLog Analyzer deployment. One of the requirements that makes our hay shine is ‘User based activity’

EventLogAnalyzer 1 min read