• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Product:Security Information and Event Management

Log360 | September 11, 2019

Announcing our weekly podcast series—subscribe now and start listening

Have you ever imagined listening to your favorite IT security expert discuss the ways you...

Combating threats with UEBA: Health is wealth

Log360 | September 9, 2019

Combating threats with UEBA: Health is wealth

In this four-part series, Combating threats with UEBA, we explore hypothetical...

ADAudit Plus | September 6, 2019

NTLM vulnerabilities that make you susceptible to relay attacks

In June 2019, Microsoft released patches for two critical vulnerabilities that were...

Log360 | August 20, 2019

Keeping up with compliance regulations like the GDPR and CCPA - Free webinar

The EU's GDPR and California's CCPA are two of the world’s most prominent data regulations...

Zooming in on UEBA: Answering the "what" and the "how" 

Log360 | August 12, 2019

Zooming in on UEBA: Answering the "what" and the "how" 

What is UEBA? User and entity behavior analytics (UEBA) is a relatively new category of...

Find out which of your employees pose the greatest security risk

ADAudit Plus | August 8, 2019

Find out which of your employees pose the greatest security risk

Among the different types of cyberattacks, insider threats are the hardest to track and...

Security Information and Event Management | August 6, 2019

Five events you should be alerted about in your network

"What types of events in my network are indications of an attack?" This is a question many...

User and entity behavior analytics: The intelligent guardian of your business

Log360 | August 5, 2019

User and entity behavior analytics: The intelligent guardian of your business

Identities are easy to fake, but not actions. Closely monitoring the behavior of a person...

Dealing with three pathbreaking scenarios under the CCPA

Log360 | August 1, 2019

Dealing with three pathbreaking scenarios under the CCPA

The "right to be forgotten" is one of the new rights consumers will have under the CCPA. ...

Log360 | July 22, 2019

Five reasons to choose Log360, part 5: Integrated compliance management

So far in this blog series, we've seen how Log360 is simple to get up and running, allows...

Detecting first time processes on member servers to protect against attacks

ADAudit Plus | July 17, 2019

Detecting first time processes on member servers to protect against attacks

In a previous blog, we saw how ADAudit Plus’ user behavior analytics (UBA) capabilities...

Log360 | July 15, 2019

Five reasons to choose Log360, part 4: Advanced security features

Part two and part three of this blog series gave a detailed look at Log360's in-depth...

Page 14 of 110« First«...1213141516...»Last »