General | April 30, 2019ManageEngine User Conference in the Big D Seeing as everything’s bigger in Texas, it should come as no surprise that ManageEngine’s...
IT Security | April 29, 2019We’re an April 2019 Gartner Peer Insights Customers’ Choice for SIEM—thanks to you! We’re happy to announce that ManageEngine is an April 2019 Gartner Peer Insights Customers...
Log360 | April 29, 2019Log360 named a Champion in Software Reviews’ 2019 SIEM Customer Experience Report Software Reviews, a division of Info-Tech Research Group, has named Log360 a Champion in...
General | April 26, 2019Five worthy reads: Wrapping security into every aspect of DevOps Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
Log360 | April 22, 2019Free webinar on accelerating threat detection and response with user and entity behavior analytics (UEBA) Most security personnel take measures to combat threats from outside the network. However,...
Identity and access management | April 11, 2019Attend our Active Directory (AD) and IT security seminar from the comfort of your workplace We're thrilled to announce that our two-day Active Directory and IT security seminar will...
Identity and access management | March 6, 2019Gain insights into user behavior and detect insider threats A whopping 60 percent of cyberattacks are caused by insiders. This could be due to...
IT Security | February 19, 2019Help us understand and measure your SOC performance [Survey] What gets measured gets managed. You probably intuitively sense the truth in that...
IT Security | January 24, 2019ManageEngine recognized in Gartner Magic Quadrant for Security Information and Event Management three years in a row We're happy to announce that ManageEngine has been positioned in Gartner's Magic Quadrant...
IT Security | January 14, 2019The role of SIEM in PCI DSS compliance Studies have shown a direct correlation between data breaches and non-compliance. This isn...
Log360 | December 18, 2018Conquer it with correlation—Part 3: Cryptojacking In the previous posts of this blog series, we discussed advanced persistent threats and...
IT Security | October 2, 2018Simplifying security auditing, part 6: Compliance and the cloud In part 5, we looked at auditing your network device logs. A decade ago, security...