• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Tags:Data protection

Five worthy reads: Cybersecurity in the age of AI — Battling sophisticated threats

General | July 28, 2023

Five worthy reads: Cybersecurity in the age of AI — Battling sophisticated threats

Five worthy reads is a regular column on five noteworthy items we have discovered while...

[Webinar] How to implement an effective data loss prevention strategy

Log360 | July 10, 2023

[Webinar] How to implement an effective data loss prevention strategy

Data is your organization's lifeblood. Ensuring it doesn't fall into the wrong hands must...

Security Information and Event Management | January 27, 2022

Data Privacy Day, Part 1: What you need to know about data privacy

Data Privacy Day (known in Europe as Data Protection Day) is an international event aimed...

Visit us at LEAP this February in Saudi Arabia

General | January 20, 2022

Visit us at LEAP this February in Saudi Arabia

ManageEngine is excited to participate in the global technology event LEAP from February...

IT Security | October 5, 2021

13 reasons Log360 is the SIEM solution for you: Part 2

Read the first part here.  #8: You get a state-of-the-art compliance management tool Our...

General | February 12, 2021

How does ManageEngine comply with the UK data protection laws post-Brexit?

Note: This blog is published by Zoho and is applicable to all divisions of Zoho including ...

Five worthy reads: Privacy in pandemic management

General | June 12, 2020

Five worthy reads: Privacy in pandemic management

Five worthy reads is a regular column on five noteworthy items we have discovered while...

Five worthy reads: Is your enterprise dealing with data sprawl properly?

General | July 19, 2019

Five worthy reads: Is your enterprise dealing with data sprawl properly?

Five worthy reads is a regular column on five noteworthy items we’ve discovered while...

IT Security | June 6, 2018

Adopting a SIEM solution, Part 1: Why choose SIEM?

Security threats are on the rise and hackers' attack methods are becoming more...

Five worthy reads: Data security is taking the world by storm

General | April 27, 2018

Five worthy reads: Data security is taking the world by storm

Five worthy reads is a regular column on five noteworthy items we’ve discovered while...

How to comply with the GDPR if you're already ISO 27001-compliant

IT Security | January 30, 2018

How to comply with the GDPR if you're already ISO 27001-compliant

Most GDPR articles outline the methods you must employ to ensure compliance while...

The GDPR: Requirements pertaining to data collection

IT Security | August 1, 2017

The GDPR: Requirements pertaining to data collection

Welcome to part two in a four part blog series about the European Union's GDPR. In our...

Page 1 of 112»Last »