Log360 | July 15, 2019Five reasons to choose Log360, part 4: Advanced security features Part two and part three of this blog series gave a detailed look at Log360's in-depth...
Log360 | December 18, 2018Conquer it with correlation—Part 3: Cryptojacking In the previous posts of this blog series, we discussed advanced persistent threats and...
Log360 | December 3, 2018Conquer it with correlation—Part 2: The data breach In my previous post, we looked at how event correlation can be used to deal with advanced...
Log360 | November 26, 2018Conquer it with correlation—Part 1: The advanced persistent threat (APT) Among all the pesky attacks that keep security administrators working late, advanced...
Log360 | August 23, 2018Unravel security incidents using event correlation [Webinar] Event correlation helps you wrap your head around the countless number of events going on...
EventLog Analyzer | April 24, 2018Connecting the logs with event correlation Starting with the basics Security information and event management (SIEM) helps with...
IT Security | July 4, 2017Log management and SIEM fundamentals: Mitigating security threats In parts 1 and 2 of this blog series, we went over SIEM and its role in performing a...
AlarmsOne | August 4, 2015Centralized Alarm Management for Free! Alarms are critical in almost every industry. Alarms alert organizations to perceived...