• Topics
    • Advanced IT analytics
    • General
    • Identity and access management
    • IT operations management and observability
    • Unified service management
    • Unified endpoint management and security
    • Security Information and Event Management

Home / Blog

Log360 | October 10, 2017

Six things to consider before choosing a log management solution

Budgeting for IT has always been a problematic topic of discussion when planning an...

Log360 | September 20, 2017

Adopting a SIEM solution? Here's what you need to know

Cyberattacks have become an everyday affair, especially with the WannaCry attack and...

Getting to know the GDPR: The technical and organizational measures

EventLog Analyzer | August 28, 2017

Getting to know the GDPR: The technical and organizational measures

Before we jump into the third part of this GDPR blog series, let's take a moment to think...

The case for incident management in a SIEM system

Log360 | July 18, 2017

The case for incident management in a SIEM system

Log360's latest incident management system is the perfect bridge between your incident...

Could adding devices for log collection be any easier?

EventLog Analyzer | March 21, 2017

Could adding devices for log collection be any easier?

In December, we released EventLog Analyzer 11.3, which automatically discovers Windows...

EventLog Analyzer | December 6, 2016

Three ways EventLog Analyzer enhances SIEM usability

When people talk about SIEM, they don't usually focus on usability. Vendors tend to focus...

How EventLog Analyzer simplifies log searches

EventLog Analyzer | November 14, 2016

How EventLog Analyzer simplifies log searches

Log data can be massive even in small organizations. Many of these logs might just be...

Halloween contest: What is your biggest fear? Zombies or hackers?

EventLog Analyzer | October 21, 2016

Halloween contest: What is your biggest fear? Zombies or hackers?

It’s that time of the year again when as the leaves fall, we brace ourselves for copious...

EventLog Analyzer | October 7, 2016

Looking beyond Windows part 2: Application log management

Earlier, we discussed how effective syslog management can improve your network's security....

EventLog Analyzer | September 26, 2016

Looking beyond Windows part 1: Syslog management

Network security management is about more than just your Windows machines. You probably...

EventLog Analyzer | March 12, 2015

Protective, GPG13-Compliant Monitoring Using EventLog Analyzer

​The journey to a thousand IT problems begins with a single compliance lapse. Yes, this...

ADAudit Plus | December 24, 2014

ADAudit Plus Voted WindowSecurity.com Readers’ Choice Winner

Talk about a wonderful holiday gift: Leading Windows security resource site,...

Page 18 of 28« First«...1617181920...»Last »