• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Tags:Log360

Five reasons to choose Log360, part 1: User-friendly deployment and UI

Log360 | June 24, 2019

Five reasons to choose Log360, part 1: User-friendly deployment and UI

SIEM solutions are a must-have in any organization's security toolkit. They allow you to...

Conquer it with correlation—Part 3: Cryptojacking

Log360 | December 18, 2018

Conquer it with correlation—Part 3: Cryptojacking

In the previous posts of this blog series, we discussed advanced persistent threats and...

Conquer it with correlation—Part 2: The data breach

Log360 | December 3, 2018

Conquer it with correlation—Part 2: The data breach

In my previous post, we looked at how event correlation can be used to deal with advanced...

Conquer it with correlation—Part 1: The advanced persistent threat (APT)

Log360 | November 26, 2018

Conquer it with correlation—Part 1: The advanced persistent threat (APT)

Among all the pesky attacks that keep security administrators working late, advanced...

Unravel security incidents using event correlation [Webinar]

Log360 | August 23, 2018

Unravel security incidents using event correlation [Webinar]

Event correlation helps you wrap your head around the countless number of events going on...

Log360 | July 27, 2018

Webinar: Streamline incident management using SIEM

Organizations deal with several security incidents on a daily basis. Establishing...

Log360 | June 25, 2018

Contest alert: Take part in the Log360 product pro challenge

We are delighted to announce our "Log360 product pro" challenge, a unique community...

Train to be a SIEM scholar with our Log360 certification program

IT Security | April 26, 2018

Train to be a SIEM scholar with our Log360 certification program

Starting April 25th, we're hosting a free, four-part training program on security...

General | April 12, 2018

Third biggest data breach in history emphasizes the need for the GDPR

The top two data breaches in history, when you look at the number of affected users, comes...

Log360 | October 10, 2017

Six things to consider before choosing a log management solution

Budgeting for IT has always been a problematic topic of discussion when planning an...

<em>Where’d you get those macarons?</em> and other top questions from our AD one-on-ones

Identity and access management | October 5, 2017

<em>Where’d you get those macarons?</em> and other top questions from our AD one-on-ones

Last month we said you should be able to "spend less time worrying about your IT, and...

Log360 | September 20, 2017

Adopting a SIEM solution? Here's what you need to know

Cyberattacks have become an everyday affair, especially with the WannaCry attack and...

Page 3 of 4«1234»Last »