Simplifying security auditing, Part 1: Regularly reviewing server activity 

Everyone knows about the importance of log management in IT security. Yet, organizations struggle with implementing effective log management techniques in their networks. This blog series aims to...

IT Security 2 min read Read

Network breach at Australian National University serves as a reminder about the Notifiable Data Breaches scheme 

Earlier this month, several news outlets reported that Australian National University’s (ANU) network was breached, allegedly by Chinese hackers. Although the official statement from ANU said that the...

IT Security 2 min read Read

How to leverage SIEM to meet the GDPR’s requirements

Today’s businesses run on data. From getting customer information for payment, processing employee information for payroll, using publicly available data for targeted advertising, to tracking people’s behavior for marketing,...

IT Security 3 min read Read

Learn how to audit and secure your SQL and IIS servers

Virtually every business today depends on databases and web servers for daily operations. Since these business-critical applications deal with sensitive data, keeping them secure is a major priority—as a security...

IT Security 1 min read Read

Adopting a SIEM solution, Part 2: What should you consider when choosing a SIEM tool?

In part one of this two-part series, we discussed why organizations should adopt a SIEM solution to ensure network security. In this second part, we’ll be demystifying the critical capabilities of SIEM tools and...

EventLogAnalyzer 3 min read Read

Adopting a SIEM solution, Part 1: Why choose SIEM?

Security threats are on the rise and hackers’ attack methods are becoming more sophisticated each day. According to the recent Verizon Data Breach Report, “Sixty-eight...

IT Security 2 min read Read

Free webinar on setting up critical security alerts in your environment 

Every security team relies on security alerts as indicators of compromise (IOCs). Effectively detecting and responding to threats is a crucial aspect of several regulatory mandates and is fundamental in mitigating data...

IT Security 1 min read Read

Active Directory and IT security seminars are back in the US this June

Get ready, America. ManageEngine is heading back to the US for another round of seminars on Active Directory management and IT security. After circling the globe for our 2018...

IT Security 1 min read Read

Are you GDPR ready? 

There’s no doubt that the General Data Protection Regulation (GDPR) is one of the most highly anticipated regulatory mandates of the last decade. With May 25—the deadline...

EventLogAnalyzer 2 min read Read