• Topics
    • Advanced IT analytics
    • General
    • Identity and access management
    • IT operations management and observability
    • Unified service management
    • Unified endpoint management and security
    • Security Information and Event Management

Home / Blog

[Infographic]Three tips to simplify Active Directory compliance and auditing

ADAudit Plus | June 6, 2019

[Infographic]Three tips to simplify Active Directory compliance and auditing

In the previous blog of this series, "[Infographic] Still manually onboarding users into...

Log360 named a Champion in Software Reviews’ 2019 SIEM Customer Experience Report

Log360 | April 29, 2019

Log360 named a Champion in Software Reviews’ 2019 SIEM Customer Experience Report

Software Reviews, a division of Info-Tech Research Group, has named Log360 a Champion in...

Log360 | April 22, 2019

Free webinar on accelerating threat detection and response with user and entity behavior analytics (UEBA)

Most security personnel take measures to combat threats from outside the network. However,...

Rule impact analysis: A new dawn of firewall policy planning

Firewall Analyzer | April 15, 2019

Rule impact analysis: A new dawn of firewall policy planning

A network security device is only as strong as its rules and policies. Firewalls can have...

Quick tips to ensure your Azure AD is safe from threats

ADAudit Plus | February 25, 2019

Quick tips to ensure your Azure AD is safe from threats

Being the gatekeeper of Microsoft's cloud solutions, Azure AD comes with a wide range of...

Tracking insider threats with AI

ADAudit Plus | February 11, 2019

Tracking insider threats with AI

If you thought masked hackers in dark rooms spreading malware were your only security...

Conquer it with correlation—Part 3: Cryptojacking

Log360 | December 18, 2018

Conquer it with correlation—Part 3: Cryptojacking

In the previous posts of this blog series, we discussed advanced persistent threats and...

Conquer it with correlation—Part 2: The data breach

Log360 | December 3, 2018

Conquer it with correlation—Part 2: The data breach

In my previous post, we looked at how event correlation can be used to deal with advanced...

Conquer it with correlation—Part 1: The advanced persistent threat (APT)

Log360 | November 26, 2018

Conquer it with correlation—Part 1: The advanced persistent threat (APT)

Among all the pesky attacks that keep security administrators working late, advanced...

Firewall Analyzer enhancements that fire up your firewall devices

Firewall Analyzer | November 22, 2018

Firewall Analyzer enhancements that fire up your firewall devices

The Firewall Analyzer team is constantly working on enhancements to improve its product...

Account lockout and management tools

ADAudit Plus | November 16, 2018

Account lockout and management tools

Sometimes, when you get a call regarding a password reset, you can already guess who it...

Webinar: Learn a simple three-step approach to tackling threats

Log360 | September 26, 2018

Webinar: Learn a simple three-step approach to tackling threats

Technology has a lot to offer, from streamlining your business processes to protecting...

Page 16 of 29« First«...1415161718...»Last »