• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Tags:security attacks

The role of endpoints in the security of your network

Log360 | June 21, 2021

The role of endpoints in the security of your network

Endpoint security is a hot topic of discussion, especially now with so many businesses...

Building a complete network security checklist

Log360 | May 24, 2021

Building a complete network security checklist

Understanding what to audit in a network can be chaotic and confusing. Building a complete...

IT security under attack: Why are group memberships so crucial?

Log360 | December 18, 2020

IT security under attack: Why are group memberships so crucial?

Security groups either make or break your IT security. Group memberships are responsible...

IT Security | June 6, 2018

Adopting a SIEM solution, Part 1: Why choose SIEM?

Security threats are on the rise and hackers' attack methods are becoming more...

How EventLog Analyzer simplifies log searches

EventLog Analyzer | November 14, 2016

How EventLog Analyzer simplifies log searches

Log data can be massive even in small organizations. Many of these logs might just be...