• Topics
    • Advanced IT analytics
    • General
    • Identity and access management
    • IT operations management and observability
    • Unified service management
    • Unified endpoint management and security
    • Security Information and Event Management

Home / Blog

ManageEngine Recognized in the 2025 Gartner® Magic Quadrant™ for Security Information and Event Management

IT Security | November 5, 2025

ManageEngine Recognized in the 2025 Gartner® Magic Quadrant™ for Security Information and Event Management

We’re proud to announce that ManageEngine has once again been recognized in the 2025...

Log360 reengineers detection to fight alert fatigue and deliver true signal

IT Security | September 18, 2025

Log360 reengineers detection to fight alert fatigue and deliver true signal

Security teams are under siege; not just from attackers, but from the sheer noise of their...

ManageEngine Log360 launches Zia Insights, its first AI-powered contextual analytics for modern SOCs

IT Security | July 10, 2025

ManageEngine Log360 launches Zia Insights, its first AI-powered contextual analytics for modern SOCs

Security operations centers (SOCs) have been drowning in a sea of alerts, raw logs, and...

The Log360 security platform: Thinking outside the logs

IT Security | March 5, 2025

The Log360 security platform: Thinking outside the logs

We're excited to announce the evolution of our SIEM solution, Log360, into a unified...

Cybersecurity forecast: Top CIOs reveal their biggest fears and plans

IT Security | August 13, 2024

Cybersecurity forecast: Top CIOs reveal their biggest fears and plans

Did you know that 79% of top CIOs believe AI-driven cyberattacks will be the most...

IT Security | January 25, 2024

Understanding the Okta supply chain attack of 2023: A comprehensive analysis

In October 2023, Okta, a leading provider of identity and access management (IAM)...

Adopting the 5S strategy in cybersecurity

IT Security | August 21, 2023

Adopting the 5S strategy in cybersecurity

The 5S strategy has long been considered a reliable approach to workplace organization....

MOVEit mayhem: Attackers found, patch released, but no end in sight

IT Security | June 28, 2023

MOVEit mayhem: Attackers found, patch released, but no end in sight

The entire cybersecurity realm is buzzing over zero-day vulnerabilities and SQL injection...

Unravelling the TDIR framework: Conception, evolution, and categorization

IT Security | May 31, 2023

Unravelling the TDIR framework: Conception, evolution, and categorization

Cybersecurity is a mix of both reactive and proactive approaches. In the past,...

Latitude data breach: How one click could cost you everything

IT Security | May 19, 2023

Latitude data breach: How one click could cost you everything

Imagine clicking on a seemingly harmless link and unknowingly giving away your personal...

5 advantages of deploying a cloud SIEM solution

IT Security | November 28, 2022

5 advantages of deploying a cloud SIEM solution

As organizations are rapidly moving to the cloud to leverage the cloud advantage, services...

3 examples of organizations that could have benefited from a CASB

IT Security | August 19, 2022

3 examples of organizations that could have benefited from a CASB

In recent times, the widespread use of cloud services has become common for most...

Page 1 of 8123...»Last »