Adopting a SIEM solution, Part 2: What should you consider when choosing a SIEM tool?

What should you consider when choosing a SIEM tool.

In part one of this two-part series, we discussed why organizations should adopt a SIEM solution to ensure network security. In this second part, we’ll be demystifying the critical capabilities of SIEM tools and show you what to consider …

EventLogAnalyzer 3 min read Read

Adopting a SIEM solution, Part 1: Why choose SIEM?

Security threats are on the rise and hackers’ attack methods are becoming more sophisticated each day.

According to the recent Verizon Data Breach Report, “Sixty-eight percent of breaches took months or longer to discover, even though eighty-seven percent of the

IT Security 2 min read Read

Is global expansion crippling your hold on network security?

Globalization and foreign investments have completely changed the way enterprises are run today. Enterprises are expanding geographically to diversify their risk portfolio, but this expansion hasn’t been linear. From mergers to buyouts, today’s enterprises have endless possibilities, which translates into …

Firewall Analyzer , firewallanalyzer 2 min read Read

Free webinar on setting up critical security alerts in your environment 

Every security team relies on security alerts as indicators of compromise (IOCs). Effectively detecting and responding to threats is a crucial aspect of several regulatory mandates and is fundamental in mitigating data breaches.

Configuring security alerts requires some considerations, such …

IT Security 1 min read Read

Active Directory and IT security seminars are back in the US this June

Get ready, America. ManageEngine is heading back to the US for another round of seminars on Active Directory management and IT security. After circling the globe for our 2018 Active Directory World Tour, we’re excited to return to the East …

IT Security 1 min read Read

Are you GDPR ready? 

There’s no doubt that the General Data Protection Regulation (GDPR) is one of the most highly anticipated regulatory mandates of the last decade. With May 25—the deadline to comply with the GDPR—just around the corner, you have less than 30 …

EventLogAnalyzer 2 min read Read

Ransomware attacks continue to rise in 2018

It’s official. Ransomware isn’t just one of the most common types of malware, it is the most prevalent malware used in cyberattacks according to the 2018 Verizon Data Breach Investigations Report (DBIR). This report found that of the data breaches …

IT Security 2 min read Read

Train to be a SIEM scholar with our Log360 certification program

Starting April 25th, we’re hosting a free, four-part training program on security information and event management (SIEM). We’re excited to bring you this training for two reasons. First, we’ve updated this training to encompass new features—including event correlation, SQL autodiscovery, …

IT Security 2 min read Read

Connecting the logs with event correlation

Starting with the basics

Security information and event management (SIEM) helps with managing and analyzing the vast amount of log information generated by networks. Of all the capabilities of SIEM, event correlation is the most powerful. This technique analyzes log …

EventLogAnalyzer 2 min read Read