How to leverage SIEM to meet the GDPR’s requirements

Today’s businesses run on data. From getting customer information for payment, processing employee information for payroll, using publicly available data for targeted advertising, to tracking people’s behavior for marketing,...

IT Security 3 min read Read

Learn how to audit and secure your SQL and IIS servers

Virtually every business today depends on databases and web servers for daily operations. Since these business-critical applications deal with sensitive data, keeping them secure is a major priority—as a security...

IT Security 1 min read Read

Adopting a SIEM solution, Part 2: What should you consider when choosing a SIEM tool?

In part one of this two-part series, we discussed why organizations should adopt a SIEM solution to ensure network security. In this second part, we’ll be demystifying the critical capabilities of SIEM tools and...

EventLogAnalyzer 3 min read Read

Adopting a SIEM solution, Part 1: Why choose SIEM?

Security threats are on the rise and hackers’ attack methods are becoming more sophisticated each day. According to the recent Verizon Data Breach Report, “Sixty-eight...

IT Security 2 min read Read

Free webinar on setting up critical security alerts in your environment 

Every security team relies on security alerts as indicators of compromise (IOCs). Effectively detecting and responding to threats is a crucial aspect of several regulatory mandates and is fundamental in mitigating data...

IT Security 1 min read Read

Active Directory and IT security seminars are back in the US this June

Get ready, America. ManageEngine is heading back to the US for another round of seminars on Active Directory management and IT security. After circling the globe for our 2018...

IT Security 1 min read Read

Are you GDPR ready? 

There’s no doubt that the General Data Protection Regulation (GDPR) is one of the most highly anticipated regulatory mandates of the last decade. With May 25—the deadline...

EventLogAnalyzer 2 min read Read

Ransomware attacks continue to rise in 2018

It’s official. Ransomware isn’t just one of the most common types of malware, it is the most prevalent malware used in cyberattacks according to the 2018 Verizon...

IT Security 2 min read Read

Train to be a SIEM scholar with our Log360 certification program

Starting April 25th, we’re hosting a free, four-part training program on security information and event management (SIEM). We’re excited to bring you this training for two...

IT Security 2 min read Read