Log360 | December 3, 2018Conquer it with correlation—Part 2: The data breach In my previous post, we looked at how event correlation can be used to deal with advanced...
Log360 | November 26, 2018Conquer it with correlation—Part 1: The advanced persistent threat (APT) Among all the pesky attacks that keep security administrators working late, advanced...
Firewall Analyzer | November 22, 2018Firewall Analyzer enhancements that fire up your firewall devices The Firewall Analyzer team is constantly working on enhancements to improve its product...
ADAudit Plus | November 16, 2018Account lockout and management tools Sometimes, when you get a call regarding a password reset, you can already guess who it...
Log360 | September 26, 2018Webinar: Learn a simple three-step approach to tackling threats Technology has a lot to offer, from streamlining your business processes to protecting...
Log360 | August 23, 2018Unravel security incidents using event correlation [Webinar] Event correlation helps you wrap your head around the countless number of events going on...
Log360 | July 27, 2018Webinar: Streamline incident management using SIEM Organizations deal with several security incidents on a daily basis. Establishing...
Firewall Analyzer | July 12, 2018Cyberattacks are coming—is your firewall ready? In HBO's hit series Game of Thrones, the Seven Kingdoms had the Wall to keep out White...
Security Information and Event Management | July 6, 2018Learn how to audit and secure your SQL and IIS servers Virtually every business today depends on databases and web servers for daily operations....
EventLog Analyzer | July 3, 2018Adopting a SIEM solution, Part 2: What should you consider when choosing a SIEM tool? In part one of this two-part series, we discussed why organizations should adopt a SIEM...
Log360 | June 25, 2018Contest alert: Take part in the Log360 product pro challenge We are delighted to announce our "Log360 product pro" challenge, a unique community...
DataSecurity Plus | June 22, 2018Free webinar: Learn how to protect your enterprise from ransomware What's the first thing that comes to mind when you think about ransomware defense?...