• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Product:Security Information and Event Management

Log360 | July 8, 2019

Five reasons to choose Log360, part 3: Comprehensive network auditing

In the previous post, we discussed the various environments that Log360 helps you audit...

Monitoring user logon activity to identify compromised accounts

ADAudit Plus | July 4, 2019

Monitoring user logon activity to identify compromised accounts

In a previous blog, we saw how ADAudit Plus' user behavior analytics (UBA) capabilities...

Five reasons to choose Log360, part 2: Multi-environment support

Log360 | July 1, 2019

Five reasons to choose Log360, part 2: Multi-environment support

In the previous post of this series, we looked at how easy it is to get Log360 up and...

Unmask malicious insiders with user behavior analytics

ADAudit Plus | June 28, 2019

Unmask malicious insiders with user behavior analytics

Insider threats are both the most successful way to exfiltrate sensitive business data...

Five reasons to choose Log360, part 1: User-friendly deployment and UI

Log360 | June 24, 2019

Five reasons to choose Log360, part 1: User-friendly deployment and UI

SIEM solutions are a must-have in any organization's security toolkit. They allow you to...

[Infographic]Three tips to simplify Active Directory compliance and auditing

ADAudit Plus | June 6, 2019

[Infographic]Three tips to simplify Active Directory compliance and auditing

In the previous blog of this series, "[Infographic] Still manually onboarding users into...

Log360 named a Champion in Software Reviews’ 2019 SIEM Customer Experience Report

Log360 | April 29, 2019

Log360 named a Champion in Software Reviews’ 2019 SIEM Customer Experience Report

Software Reviews, a division of Info-Tech Research Group, has named Log360 a Champion in...

Log360 | April 22, 2019

Free webinar on accelerating threat detection and response with user and entity behavior analytics (UEBA)

Most security personnel take measures to combat threats from outside the network. However,...

Rule impact analysis: A new dawn of firewall policy planning

Firewall Analyzer | April 15, 2019

Rule impact analysis: A new dawn of firewall policy planning

A network security device is only as strong as its rules and policies. Firewalls can have...

Quick tips to ensure your Azure AD is safe from threats

ADAudit Plus | February 25, 2019

Quick tips to ensure your Azure AD is safe from threats

Being the gatekeeper of Microsoft's cloud solutions, Azure AD comes with a wide range of...

Tracking insider threats with AI

ADAudit Plus | February 11, 2019

Tracking insider threats with AI

If you thought masked hackers in dark rooms spreading malware were your only security...

Conquer it with correlation—Part 3: Cryptojacking

Log360 | December 18, 2018

Conquer it with correlation—Part 3: Cryptojacking

In the previous posts of this blog series, we discussed advanced persistent threats and...

Page 15 of 110« First«...1314151617...»Last »