ADAudit Plus | August 8, 2019Find out which of your employees pose the greatest security risk Among the different types of cyberattacks, insider threats are the hardest to track and...
Log360 | August 5, 2019User and entity behavior analytics: The intelligent guardian of your business Identities are easy to fake, but not actions. Closely monitoring the behavior of a person...
ADAudit Plus | July 17, 2019Detecting first time processes on member servers to protect against attacks In a previous blog, we saw how ADAudit Plus’ user behavior analytics (UBA) capabilities...
Log360 | July 15, 2019Five reasons to choose Log360, part 4: Advanced security features Part two and part three of this blog series gave a detailed look at Log360's in-depth...
ADAudit Plus | July 4, 2019Monitoring user logon activity to identify compromised accounts In a previous blog, we saw how ADAudit Plus' user behavior analytics (UBA) capabilities...
ADAudit Plus | June 28, 2019Unmask malicious insiders with user behavior analytics Insider threats are both the most successful way to exfiltrate sensitive business data...
Log360 | April 22, 2019Free webinar on accelerating threat detection and response with user and entity behavior analytics (UEBA) Most security personnel take measures to combat threats from outside the network. However,...
Identity and access management | March 6, 2019Gain insights into user behavior and detect insider threats A whopping 60 percent of cyberattacks are caused by insiders. This could be due to...