Log360 | August 28, 2020Data security under the CCPA: A master class for IT administrators July 1, 2020 was a monumental day when it came to privacy laws in the United States. It...
Identity and access management | May 22, 2020How to choose the right compliance management software for your business While keeping data safe from modern cyberthreats is difficult enough, you also have to...
Log360 | August 1, 2019Dealing with three pathbreaking scenarios under the CCPA The "right to be forgotten" is one of the new rights consumers will have under the CCPA. ...
IT Security | July 20, 2018How to leverage SIEM to meet the GDPR's requirements Today's businesses run on data. From getting customer information for payment, processing...
General | March 16, 2018Five worthy reads: Kickstart your GDPR journey Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
IT Security | August 1, 2017The GDPR: Requirements pertaining to data collection Welcome to part two in a four part blog series about the European Union's GDPR. In our...
EventLog Analyzer | December 10, 2013ManageEngine's EventLog Analyzer Advances the Cloud with ActiveState Stackato The cloud, once known as the future of IT, is now part of modern IT infrastructure. With...
EventLog Analyzer | March 6, 2012Privileged User Monitoring and Audit (PUMA) Privileged Users, like Network Administrators, System Administrators, and Database...
EventLog Analyzer | November 13, 2011The Perils of Non-Compliance The word ‘compliance’ has come a long way in the English dictionary. It might have...