EventLog Analyzer | July 3, 2018Adopting a SIEM solution, Part 2: What should you consider when choosing a SIEM tool? In part one of this two-part series, we discussed why organizations should adopt a SIEM...
EventLog Analyzer | May 3, 2018Are you GDPR ready? There's no doubt that the General Data Protection Regulation (GDPR) is one of the most...
EventLog Analyzer | April 24, 2018Connecting the logs with event correlation Starting with the basics Security information and event management (SIEM) helps with...
EventLog Analyzer | March 13, 2018Talk to our experts about the essentials of log management Log management is a pillar of security information and event management (SIEM), and is...
EventLog Analyzer | January 31, 2018Let's talk about STIX, TAXII, and threat intelligence In terms of collaboration, Structured Threat Information eXpression (STIX) and Trusted...
EventLog Analyzer | August 28, 2017Getting to know the GDPR: The technical and organizational measures Before we jump into the third part of this GDPR blog series, let's take a moment to think...
EventLog Analyzer | March 21, 2017Could adding devices for log collection be any easier? In December, we released EventLog Analyzer 11.3, which automatically discovers Windows...
EventLog Analyzer | December 6, 2016Three ways EventLog Analyzer enhances SIEM usability When people talk about SIEM, they don't usually focus on usability. Vendors tend to focus...
EventLog Analyzer | November 14, 2016How EventLog Analyzer simplifies log searches Log data can be massive even in small organizations. Many of these logs might just be...
EventLog Analyzer | October 21, 2016Halloween contest: What is your biggest fear? Zombies or hackers? It’s that time of the year again when as the leaves fall, we brace ourselves for copious...
EventLog Analyzer | October 7, 2016Looking beyond Windows part 2: Application log management Earlier, we discussed how effective syslog management can improve your network's security....
EventLog Analyzer | September 26, 2016Looking beyond Windows part 1: Syslog management Network security management is about more than just your Windows machines. You probably...