• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Product:Security Information and Event Management

Data security threats: How to safeguard your data from modern pirates [Free e-book]

DataSecurity Plus | July 26, 2024

Data security threats: How to safeguard your data from modern pirates [Free e-book]

To stay safe from modern-day pirates, you need elaborate, multi-layered security measures...

ManageEngine Firewall Analyzer Named Leader in G2 Grid® for Network Security Policy Management

Firewall Analyzer | May 30, 2024

ManageEngine Firewall Analyzer Named Leader in G2 Grid® for Network Security Policy Management

We are thrilled to announce that ManageEngine Firewall Analyzer has been recognized as a...

Log360 | May 13, 2024

Has your personal data been breached on the dark web?

The dark web can feel like a mysterious underworld, a hidden corner of the internet where...

Understanding the foundation: Exploring the world of firewall security

Firewall Analyzer | May 3, 2024

Understanding the foundation: Exploring the world of firewall security

In the vast cybersecurity landscape, one fundamental element stands tall as a guardian...

USB review, Part 2: How to manage USB devices

DataSecurity Plus | March 20, 2024

USB review, Part 2: How to manage USB devices

In this two-part series, the first blog demonstrates how USB devices can be conduits of...

Evaluating the differences: What businesses should know about PCI DSS v4.0 versus v3.2.1

Security Information and Event Management | February 28, 2024

Evaluating the differences: What businesses should know about PCI DSS v4.0 versus v3.2.1

In the realm of payment security, the Payment Card Industry Data Security Standard (PCI...

Data poisoning: Prevention strategies to keep your data safe

Log360 | January 30, 2024

Data poisoning: Prevention strategies to keep your data safe

The amount of data generated and fed into AI systems has increased quickly over the last...

USB review, Part 1: How are USB flash drives a security risk?

DataSecurity Plus | January 17, 2024

USB review, Part 1: How are USB flash drives a security risk?

We've all used pocket-sized USB drives to store and transfer data. We've also lost them...

Protecting your SDLC from a supply chain attack

Log360 | December 19, 2023

Protecting your SDLC from a supply chain attack

Did you know that nine out of 10 companies detected software supply chain risks in the...

ADAudit Plus | November 21, 2023

5 limitations of Windows auditing tools and how you can overcome them [Free e-book]

Auditing is essential for addressing security, operational, and compliance needs in a...

How to improve risk scoring and threat detection with UEBA [Free e-book]

Log360 | November 16, 2023

How to improve risk scoring and threat detection with UEBA [Free e-book]

Did you know that in 2022, the mean time to detect a breach was as many as 207 days? It's...

Cisco firewall management: Simplify your network security with Firewall Analyzer

Firewall Analyzer | November 10, 2023

Cisco firewall management: Simplify your network security with Firewall Analyzer

Firewalls act as the first line of defense against external threats and form the core of...

Page 3 of 28«12345...»Last »