• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Product:Security Information and Event Management

How to calculate the cost savings from a SIEM implementation [White paper]

Log360 | November 29, 2022

How to calculate the cost savings from a SIEM implementation [White paper]

Have you ever wondered how much a SIEM solution can save you but are unsure how to...

5 advantages of deploying a cloud SIEM solution

IT Security - Cloud | November 28, 2022

5 advantages of deploying a cloud SIEM solution

As organizations are rapidly moving to the cloud to leverage the cloud advantage, services...

ManageEngine wins at the Cybersecurity Breakthrough Awards 2022!

ADAudit Plus | November 22, 2022

ManageEngine wins at the Cybersecurity Breakthrough Awards 2022!

It gives us immense pleasure to announce that ManageEngine has been declared a winner in...

Essential Eight compliance made easy with SIEM powered by MITRE ATT&CK

Log360 | November 11, 2022

Essential Eight compliance made easy with SIEM powered by MITRE ATT&CK

The amount of data generated worldwide is set to exceed 200 zettabytes by 2025. A...

ADAudit Plus User Logon Reports, Part 1: Logon Failures

ADAudit Plus | November 10, 2022

ADAudit Plus User Logon Reports, Part 1: Logon Failures

ManageEngine ADAudit Plus is a real-time change auditing and reporting software that...

Traversing from healthcare attacks to HIPAA compliance

Log360 | November 7, 2022

Traversing from healthcare attacks to HIPAA compliance

Healthcare organizations are unarguably popular targets for cyberattacks. With an...

Monitor your firewalls on the go with Firewall Analyzer's mobile app

Firewall Analyzer | October 11, 2022

Monitor your firewalls on the go with Firewall Analyzer's mobile app

The number of cybersecurity events faced by companies and businesses across the globe has...

7 key features of SIEM that every enterprise administrator should be aware of

Security Information and Event Management | October 10, 2022

7 key features of SIEM that every enterprise administrator should be aware of

A SIEM solution has become an integral part of an organization's security arsenal. But...

[Webinar] The top-five correlation rules to master threat detection in your network

Log360 | October 6, 2022

[Webinar] The top-five correlation rules to master threat detection in your network

Correlating events to identify if they are part of a larger incident or attack is one of...

Device discovery: The path to total network visibility

Log360 | October 3, 2022

Device discovery: The path to total network visibility

For an organization to prevent cyberattacks, it first needs complete visibility into all...

ADAudit Plus | September 29, 2022

See your estimated ROI when you automate IT audit report generation with ADAudit Plus

In an IT environment, audit reports need to be generated to meet various security and...

[E-book] How to detect and respond to cryptojacking attacks

Log360 | September 26, 2022

[E-book] How to detect and respond to cryptojacking attacks

Did you know that while the world was grappling with the effects of the pandemic,...

Page 7 of 28« First«...56789...»Last »