EventLog Analyzer | March 12, 2015Protective, GPG13-Compliant Monitoring Using EventLog Analyzer The journey to a thousand IT problems begins with a single compliance lapse. Yes, this...
EventLog Analyzer | December 3, 2014Solving a Cyber Crime Case Like Sherlock Holmes IT security managers lay a lot of emphasis on conducting log forensics investigations....
EventLog Analyzer | November 11, 20148 Log Management Habits of Highly Effective IT Security Managers In today’s business environment, data is the source that drives organizations in the...
EventLog Analyzer | August 6, 2014Combat Advanced Cyber Attacks With Shared Security Intelligence (Originally published in Cyber Defense Magazine, Black Hat special edition) In this...
EventLog Analyzer | January 24, 2014IT Security and Auditing Framework - A Glass Half Full or Half Empty? Log Management, Compliance Reporting and SIEM Corporate islands with no connectivity to...
EventLog Analyzer | December 10, 2013ManageEngine's EventLog Analyzer Advances the Cloud with ActiveState Stackato The cloud, once known as the future of IT, is now part of modern IT infrastructure. With...
EventLog Analyzer | November 13, 2013ManageEngine EventLog Analyzer Secures Gold Award [caption id="attachment_39186" align="alignleft" width="397"] EventLog Analyzer grabs...
EventLog Analyzer | November 5, 2013PCI DSS 3.0: Shifting focus on daily review of ‘security-relevant’ logs to identify suspicious activities [Part-3] Ever since the release of the PCI DSS version 3.0 change highlights by the PCI Security...
EventLog Analyzer | October 6, 20122013 SC Awards: Cast Your Vote for EventLog Analyzer Cast your vote for ManageEngine EventLog Analyzer which is nominated for the Best...
EventLog Analyzer | October 3, 2012ManageEngine Thoughts: Software Defined Networking #1 With Software Defined Networking (SDN) being the new industry buzzword, more and more...
EventLog Analyzer | June 20, 2012Object access auditing simplified: Find the who, what, when, and where of file and folder accesses For many administrators face knowing what actually happened to their files and folders can...
EventLog Analyzer | March 6, 2012Privileged User Monitoring and Audit (PUMA) Privileged Users, like Network Administrators, System Administrators, and Database...