Log360 | August 1, 2019Dealing with three pathbreaking scenarios under the CCPA The "right to be forgotten" is one of the new rights consumers will have under the CCPA. ...
Log360 | July 22, 2019Five reasons to choose Log360, part 5: Integrated compliance management So far in this blog series, we've seen how Log360 is simple to get up and running, allows...
ADAudit Plus | July 17, 2019Detecting first time processes on member servers to protect against attacks In a previous blog, we saw how ADAudit Plus’ user behavior analytics (UBA) capabilities...
Log360 | July 15, 2019Five reasons to choose Log360, part 4: Advanced security features Part two and part three of this blog series gave a detailed look at Log360's in-depth...
Log360 | July 8, 2019Five reasons to choose Log360, part 3: Comprehensive network auditing In the previous post, we discussed the various environments that Log360 helps you audit...
ADAudit Plus | July 4, 2019Monitoring user logon activity to identify compromised accounts In a previous blog, we saw how ADAudit Plus' user behavior analytics (UBA) capabilities...
Log360 | July 1, 2019Five reasons to choose Log360, part 2: Multi-environment support In the previous post of this series, we looked at how easy it is to get Log360 up and...
ADAudit Plus | June 28, 2019Unmask malicious insiders with user behavior analytics Insider threats are both the most successful way to exfiltrate sensitive business data...
Log360 | June 24, 2019Five reasons to choose Log360, part 1: User-friendly deployment and UI SIEM solutions are a must-have in any organization's security toolkit. They allow you to...
ADAudit Plus | June 6, 2019[Infographic]Three tips to simplify Active Directory compliance and auditing In the previous blog of this series, "[Infographic] Still manually onboarding users into...
Log360 | April 29, 2019Log360 named a Champion in Software Reviews’ 2019 SIEM Customer Experience Report Software Reviews, a division of Info-Tech Research Group, has named Log360 a Champion in...
Log360 | April 22, 2019Free webinar on accelerating threat detection and response with user and entity behavior analytics (UEBA) Most security personnel take measures to combat threats from outside the network. However,...