Log360 | July 8, 2019Five reasons to choose Log360, part 3: Comprehensive network auditing In the previous post, we discussed the various environments that Log360 helps you audit...
ADAudit Plus | July 4, 2019Monitoring user logon activity to identify compromised accounts In a previous blog, we saw how ADAudit Plus' user behavior analytics (UBA) capabilities...
Log360 | July 1, 2019Five reasons to choose Log360, part 2: Multi-environment support In the previous post of this series, we looked at how easy it is to get Log360 up and...
ADAudit Plus | June 28, 2019Unmask malicious insiders with user behavior analytics Insider threats are both the most successful way to exfiltrate sensitive business data...
Log360 | June 24, 2019Five reasons to choose Log360, part 1: User-friendly deployment and UI SIEM solutions are a must-have in any organization's security toolkit. They allow you to...
ADAudit Plus | June 6, 2019[Infographic]Three tips to simplify Active Directory compliance and auditing In the previous blog of this series, "[Infographic] Still manually onboarding users into...
Log360 | April 29, 2019Log360 named a Champion in Software Reviews’ 2019 SIEM Customer Experience Report Software Reviews, a division of Info-Tech Research Group, has named Log360 a Champion in...
Log360 | April 22, 2019Free webinar on accelerating threat detection and response with user and entity behavior analytics (UEBA) Most security personnel take measures to combat threats from outside the network. However,...
Firewall Analyzer | April 15, 2019Rule impact analysis: A new dawn of firewall policy planning A network security device is only as strong as its rules and policies. Firewalls can have...
ADAudit Plus | February 25, 2019Quick tips to ensure your Azure AD is safe from threats Being the gatekeeper of Microsoft's cloud solutions, Azure AD comes with a wide range of...
ADAudit Plus | February 11, 2019Tracking insider threats with AI If you thought masked hackers in dark rooms spreading malware were your only security...
Log360 | December 18, 2018Conquer it with correlation—Part 3: Cryptojacking In the previous posts of this blog series, we discussed advanced persistent threats and...