• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Product:Security Information and Event Management

Could adding devices for log collection be any easier?

EventLog Analyzer | March 21, 2017

Could adding devices for log collection be any easier?

In December, we released EventLog Analyzer 11.3, which automatically discovers Windows...

EventLog Analyzer | December 6, 2016

Three ways EventLog Analyzer enhances SIEM usability

When people talk about SIEM, they don't usually focus on usability. Vendors tend to focus...

How EventLog Analyzer simplifies log searches

EventLog Analyzer | November 14, 2016

How EventLog Analyzer simplifies log searches

Log data can be massive even in small organizations. Many of these logs might just be...

Halloween contest: What is your biggest fear? Zombies or hackers?

EventLog Analyzer | October 21, 2016

Halloween contest: What is your biggest fear? Zombies or hackers?

It’s that time of the year again when as the leaves fall, we brace ourselves for copious...

EventLog Analyzer | October 7, 2016

Looking beyond Windows part 2: Application log management

Earlier, we discussed how effective syslog management can improve your network's security....

EventLog Analyzer | September 26, 2016

Looking beyond Windows part 1: Syslog management

Network security management is about more than just your Windows machines. You probably...

EventLog Analyzer | March 12, 2015

Protective, GPG13-Compliant Monitoring Using EventLog Analyzer

​The journey to a thousand IT problems begins with a single compliance lapse. Yes, this...

ADAudit Plus | December 24, 2014

ADAudit Plus Voted WindowSecurity.com Readers’ Choice Winner

Talk about a wonderful holiday gift: Leading Windows security resource site,...

Solving a Cyber Crime Case Like Sherlock Holmes

EventLog Analyzer | December 3, 2014

Solving a Cyber Crime Case Like Sherlock Holmes

IT security managers lay a lot of emphasis on conducting log forensics investigations....

8 Log Management Habits of Highly Effective IT Security Managers

EventLog Analyzer | November 11, 2014

8 Log Management Habits of Highly Effective IT Security Managers

In today’s business environment, data is the source that drives organizations in the...

Real-Time Change Auditing for ​Windows Active Directory

ADAudit Plus | October 29, 2014

Real-Time Change Auditing for ​Windows Active Directory

ManageEngine ADAudit Plus recently announced the addition of real-time change auditing for...

ADAudit Plus | September 30, 2014

Resolving configuration failures using ADAudit Plus

ManageEngine ADAudit Plus is a web-based, real-time Windows Active Directory (AD) change...

Page 18 of 29« First«...1617181920...»Last »