IT security auditing

Windows logon auditing: Everything you need to know in only 10 minutes [Free e-book]

User logon activity needs to be audited to meet various security, operational, and compliance requirements of an IT environment, such as: Detecting suspicious activities like...

ADAudit Plus 1 min read Read

SQL Server, Part 3: Adopting the principle of least privilege

In the previous blog in this series, we discussed authentication and authorization mechanisms, and how configuring them properly can help secure your databases. In this blog, we’ll talk about how data...

IT Security 3 min read Read

ManageEngine recognized in Gartner Magic Quadrant for Security Information and Event Management three years in a row

We’re happy to announce that ManageEngine has been positioned in Gartner’s Magic Quadrant for Security Information and Event Management[i] (SIEM) and its Critical Capabilities for Security Information...

General , IT Security 2 min read Read

Simplifying security auditing, Part 1: Regularly reviewing server activity 

Everyone knows about the importance of log management in IT security. Yet, organizations struggle with implementing effective log management techniques in their networks. This blog series aims to...

IT Security 2 min read Read