Log360 | April 21, 2020The Monopoly Man takes on privacy, data breaches, and more [Podcast series] In the second and final episode of our Expert Tech Talk podcast series, Ian Madrigal,...
General | April 21, 2020SQL Server, Part 2: Authentication and authorization mechanisms in SQL Server, simplified In the previous blog of this series, we discussed how monitoring SQL Server activities...
Security Information and Event Management | March 6, 2020ManageEngine named in Gartner's Magic Quadrant for Security Information and Event Management four years running! The cybersecurity market is ever-changing and primarily driven by sophisticated...
AD360 | November 27, 2019Our Active Directory and IT security virtual seminars are back. Register now! We're happy to announce that our popular Active Directory (AD) and IT security virtual...
Log360 | July 22, 2019Five reasons to choose Log360, part 5: Integrated compliance management So far in this blog series, we've seen how Log360 is simple to get up and running, allows...
ADAudit Plus | July 17, 2019Detecting first time processes on member servers to protect against attacks In a previous blog, we saw how ADAudit Plus’ user behavior analytics (UBA) capabilities...
Log360 | July 15, 2019Five reasons to choose Log360, part 4: Advanced security features Part two and part three of this blog series gave a detailed look at Log360's in-depth...
Log360 | July 8, 2019Five reasons to choose Log360, part 3: Comprehensive network auditing In the previous post, we discussed the various environments that Log360 helps you audit...
ADAudit Plus | July 4, 2019Monitoring user logon activity to identify compromised accounts In a previous blog, we saw how ADAudit Plus' user behavior analytics (UBA) capabilities...
Log360 | July 1, 2019Five reasons to choose Log360, part 2: Multi-environment support In the previous post of this series, we looked at how easy it is to get Log360 up and...
ADAudit Plus | June 28, 2019Unmask malicious insiders with user behavior analytics Insider threats are both the most successful way to exfiltrate sensitive business data...
Log360 | June 24, 2019Five reasons to choose Log360, part 1: User-friendly deployment and UI SIEM solutions are a must-have in any organization's security toolkit. They allow you to...