• Topics
    • Advanced IT analytics
    • General
    • Identity and access management
    • IT operations management and observability
    • Unified service management
    • Unified endpoint management and security
    • Security Information and Event Management

Home / Blog

Find out which of your employees pose the greatest security risk

ADAudit Plus | August 8, 2019

Find out which of your employees pose the greatest security risk

Among the different types of cyberattacks, insider threats are the hardest to track and...

Security Information and Event Management | August 6, 2019

Five events you should be alerted about in your network

"What types of events in my network are indications of an attack?" This is a question many...

User and entity behavior analytics: The intelligent guardian of your business

Log360 | August 5, 2019

User and entity behavior analytics: The intelligent guardian of your business

Identities are easy to fake, but not actions. Closely monitoring the behavior of a person...

Dealing with three pathbreaking scenarios under the CCPA

Log360 | August 1, 2019

Dealing with three pathbreaking scenarios under the CCPA

The "right to be forgotten" is one of the new rights consumers will have under the CCPA. ...

Log360 | July 22, 2019

Five reasons to choose Log360, part 5: Integrated compliance management

So far in this blog series, we've seen how Log360 is simple to get up and running, allows...

Detecting first time processes on member servers to protect against attacks

ADAudit Plus | July 17, 2019

Detecting first time processes on member servers to protect against attacks

In a previous blog, we saw how ADAudit Plus’ user behavior analytics (UBA) capabilities...

Log360 | July 15, 2019

Five reasons to choose Log360, part 4: Advanced security features

Part two and part three of this blog series gave a detailed look at Log360's in-depth...

Log360 | July 8, 2019

Five reasons to choose Log360, part 3: Comprehensive network auditing

In the previous post, we discussed the various environments that Log360 helps you audit...

Monitoring user logon activity to identify compromised accounts

ADAudit Plus | July 4, 2019

Monitoring user logon activity to identify compromised accounts

In a previous blog, we saw how ADAudit Plus' user behavior analytics (UBA) capabilities...

Five reasons to choose Log360, part 2: Multi-environment support

Log360 | July 1, 2019

Five reasons to choose Log360, part 2: Multi-environment support

In the previous post of this series, we looked at how easy it is to get Log360 up and...

Unmask malicious insiders with user behavior analytics

ADAudit Plus | June 28, 2019

Unmask malicious insiders with user behavior analytics

Insider threats are both the most successful way to exfiltrate sensitive business data...

Five reasons to choose Log360, part 1: User-friendly deployment and UI

Log360 | June 24, 2019

Five reasons to choose Log360, part 1: User-friendly deployment and UI

SIEM solutions are a must-have in any organization's security toolkit. They allow you to...

Page 15 of 29« First«...1314151617...»Last »