IT Security

Visit:

Protecting against Petya and other ransomware

As a security professional, which do you fear more: 1) explaining to your boss or CEO that your enterprise’s files are no longer accessible because they’ve been encrypted or 2) bungee jumping? I bet you and

IT Security 2 min read

Log management and SIEM fundamentals: Comprehensive log collection and auditing

The first step in SIEM is collecting log data. Log data, as we saw in part 1, is what drives any SIEM solution. A SIEM solution should be able to process, in real time, large

IT Security 3 min read

Log management and SIEM fundamentals: Getting started

Cyber attacks and network breaches can bring even the largest organizations to their knees. Recently, of course, we had the WannaCry ransomware attack, which not only highlighted the dire consequences of security vulnerabilities, but also reiterated the need

IT Security 3 min read

Brace yourself. GDPR is on the way.

Are you ready for May 25th, 2018?

A little less than a year from now, the European Union will implement the General Data Protection Regulation (GDPR) on May 25th, 2018. This regulation outlines how organizations — both commercial

IT Security 3 min read

Will you survive the certificate war between Google and Symantec? ​

Google recently accused Symantec, one of the most prominent Certificate Authorities (CAs), of violating the trust internet users place in encrypted web communication. In his post in Google Groups on March 23, 2017, Google engineer Ryan Sleevi alleged that Symantec

Key Manager Plus 2 min read

Kick-starting our free, online Log360 and ADAudit Plus workshop series

Security administrators are obviously concerned about external security threats, but did you know that internal threats can be just as dangerous? Sure you’ve got a bunch of things to audit—Windows workstations, servers, Unix machines, network devices, web servers, databases, other

IT Security 2 min read

Could adding devices for log collection be any easier?

In December, we released EventLog Analyzer 11.3, which automatically discovers Windows devices from Active Directory and workgroups. This greatly simplifies the process of configuring Windows devices for log collection.

In our release last month, we built on this idea

EventLogAnalyzer 1 min read

Breaking SIEM and network security stereotypes

 

Whenever we see the word SIEM, we can’t help but picture something really complexa huge network, a big organization, advanced attacks, and a lot more. SIEM (security information and event management)  is meant to handle higher-end

IT Security 1 min read

Simplified user certificate tracking with Key Manager Plus

Windows Active Directory (AD) is one of the most widely used administrative models among enterprises. User management in AD is smooth when there are only a few users, but as the number of users grows, problems start to arise

Key Manager Plus 2 min read