• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Tags:anomaly modeling

User identity mapping for improved anomaly detection

Log360 | May 22, 2023

User identity mapping for improved anomaly detection

In any organization, a user may access numerous devices and applications, but not always...

[Webinar] The evolution of AI and ML in cybersecurity

Log360 | April 5, 2023

[Webinar] The evolution of AI and ML in cybersecurity

Artificial intelligence (AI) and machine learning (ML) are critical components of any...