User logon activity needs to be audited to meet various security, operational, and compliance requirements of an IT environment, such as: Detecting suspicious activities like...
IT security auditing
SQL Server, Part 3: Adopting the principle of least privilege
In the previous blog in this series, we discussed authentication and authorization mechanisms, and how configuring them properly can help secure your databases. In this blog, we’ll talk about how data...

ManageEngine recognized in Gartner Magic Quadrant for Security Information and Event Management three years in a row
We’re happy to announce that ManageEngine has been positioned in Gartner’s Magic Quadrant for Security Information and Event Management[i] (SIEM) and its Critical Capabilities for Security Information...
Simplifying security auditing, Part 1: Regularly reviewing server activity
Everyone knows about the importance of log management in IT security. Yet, organizations struggle with implementing effective log management techniques in their networks. This blog series aims to...