• Topics
    • Advanced IT analytics
    • General
    • Identity and access management
    • IT operations management and observability
    • Unified service management
    • Unified endpoint management and security
    • Security Information and Event Management

Home / Blog

Security Information and Event Management | September 23, 2020

Are you listening to your logs? Part 4: Open ports

Did you know that an organization with more open ports is more vulnerable to data breaches...

Log360 | September 17, 2020

Why following NIST guidelines will strengthen your SIEM framework

The National Institute of Standards and Technology (NIST) is a federal, non-regulatory...

Firewall Analyzer | September 16, 2020

Explore how the Firewall Analyzer add-on for OpManager can help you improve your network security!

Businesses worldwide need a stable network to ensure smooth operations. Guaranteeing...

Security Information and Event Management | September 15, 2020

Are you listening to your logs? Part 3: High disk usage

In the previous blog of this series, we saw how server crashes can be avoided by detecting...

Log360 | August 28, 2020

Data security under the CCPA: A master class for IT administrators

July 1, 2020 was a monumental day when it came to privacy laws in the United States. It...

Security Information and Event Management | August 26, 2020

Are you listening to your logs? Part 2: Low disk space

In the first part of this blog series, we saw how monitoring slow server response times in...

Log360 | August 12, 2020

5 tips to avoid cyberattacks on EdTech platforms

As the COVID-19 pandemic rages on, many educational institutions have been forced to shift...

Security Information and Event Management | August 6, 2020

Are you listening to your logs? Part 1: Slow server response

Loading… Is there a more uninspiring word to encounter while browsing the internet? When a...

Log360 | August 4, 2020

Can a misconfigured user account lead to a security breach?

Do you remember the last time you had to reset the password for an admin user? Or the time...

The 5 essential components of successful file server auditing

Log360 | July 23, 2020

The 5 essential components of successful file server auditing

File server auditing is an essential process, and inattention can cost your organization...

3 things every SharePoint administrator should monitor [E-book]

SharePointManager Plus | July 23, 2020

3 things every SharePoint administrator should monitor [E-book]

Microsoft SharePoint is one of the most business-critical services in an enterprise's IT....

Security Information and Event Management | July 21, 2020

Security operations center, Part 1: The guardian of your organization

Hacking is finding a way to accomplish a goal, never accepting no for an answer, and being...

Page 12 of 29« First«...1011121314...»Last »