• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Product:Security Information and Event Management

Conquer it with correlation—Part 2: The data breach

Log360 | December 3, 2018

Conquer it with correlation—Part 2: The data breach

In my previous post, we looked at how event correlation can be used to deal with advanced...

Conquer it with correlation—Part 1: The advanced persistent threat (APT)

Log360 | November 26, 2018

Conquer it with correlation—Part 1: The advanced persistent threat (APT)

Among all the pesky attacks that keep security administrators working late, advanced...

Firewall Analyzer enhancements that fire up your firewall devices

Firewall Analyzer | November 22, 2018

Firewall Analyzer enhancements that fire up your firewall devices

The Firewall Analyzer team is constantly working on enhancements to improve its product...

Account lockout and management tools

ADAudit Plus | November 16, 2018

Account lockout and management tools

Sometimes, when you get a call regarding a password reset, you can already guess who it...

Webinar: Learn a simple three-step approach to tackling threats

Log360 | September 26, 2018

Webinar: Learn a simple three-step approach to tackling threats

Technology has a lot to offer, from streamlining your business processes to protecting...

Unravel security incidents using event correlation [Webinar]

Log360 | August 23, 2018

Unravel security incidents using event correlation [Webinar]

Event correlation helps you wrap your head around the countless number of events going on...

Log360 | July 27, 2018

Webinar: Streamline incident management using SIEM

Organizations deal with several security incidents on a daily basis. Establishing...

Cyberattacks are coming—is your firewall ready?

Firewall Analyzer | July 12, 2018

Cyberattacks are coming—is your firewall ready?

In HBO's hit series Game of Thrones, the Seven Kingdoms had the Wall to keep out White...

Security Information and Event Management | July 6, 2018

Learn how to audit and secure your SQL and IIS servers

Virtually every business today depends on databases and web servers for daily operations....

Adopting a SIEM solution, Part 2: What should you consider when choosing a SIEM tool?

EventLog Analyzer | July 3, 2018

Adopting a SIEM solution, Part 2: What should you consider when choosing a SIEM tool?

In part one of this two-part series, we discussed why organizations should adopt a SIEM...

Log360 | June 25, 2018

Contest alert: Take part in the Log360 product pro challenge

We are delighted to announce our "Log360 product pro" challenge, a unique community...

DataSecurity Plus | June 22, 2018

Free webinar: Learn how to protect your enterprise from ransomware 

What's the first thing that comes to mind when you think about ransomware defense?...

Page 16 of 28« First«...1415161718...»Last »