File server auditing is an essential process, and inattention can cost your organization heavily, both in terms of business impact, and governmental financial penalties. Imagine...
Business Intelligence Group’s 2020 Fortress Cyber Security Award for Threat Detection goes to…
We are excited to share that ManageEngine’s Log360 has been awarded the 2020 Fortress Cyber Security Award for Threat Detection. The Business Intelligence Group’s unique...
The Monopoly Man takes on privacy, data breaches, and more [Podcast series]
In the second and final episode of our Expert Tech Talk podcast series, Ian Madrigal, known as the Monopoly Man, and Sid, IT security expert at ManageEngine, get into a detailed discussion on...
The Monopoly Man features in our first-ever Expert Tech Talk podcast series. Listen now!
We are pleased to launch our first-ever Expert Tech Talk podcast series featuring renowned privacy expert Ian Madrigal, popularly known as the Monopoly Man. Ian, who has championed the cause of...
SQL Server, Part 1: Why you should monitor SQL logs
Over 44 records are stolen per second every day due to data breaches, and according to the Risk Based Security Research report published in 2019, databases are the...
Why log archival is important for network security
Network devices like workstations, servers, routers, and firewalls generate a large volume of logs every day. These digital bread crumbs can be your greatest ally...
Securing IT in healthcare organizations: All you need to know
From maintaining electronic health records and generating medical reports, to carrying out robot-assisted surgeries and setting up online doctor-patient communication portals, the healthcare industry is becoming increasingly reliant on technology to effectively carry out...
Our Weekly IT Security Podcast series is 10 episodes strong! Have you tuned in yet?
We would like to thank you for your overwhelming support for our Weekly IT Security Podcast series. ManageEngine’s 15-time Microsoft MVP, Derek Melber; Vivin Sathyan and Harish Sekar, senior technical evangelists; and IT...
Combating threats with UEBA: Money matters
In this four-part series, we explore hypothetical cyberattacks inspired by real-life events in four different industries: healthcare, finance, manufacturing, and education. We’ll take a look at...