Compliance Resources

The complete documentation hub for all official product guides and best practices.

Categories
 
 
 

Admin guide

 

 
  • Brochure
  • Datasheet
  • Infographics
 
pdf
Simplify BACEN CMN Resolution 4,893/2021 with ManageEngine IAM and SIEM solutions

Simplify BACEN CMN Resolution 4,893/2021 with ManageEngine IAM and SIEM solutions

BACEN Resolution 4,893/2021 establishes mandatory cybersecurity, incident response, and third-party risk governance requirements for Brazilian banks and financial institutions to protect information assets, ensure operational resilience, and reduce systemic cyber risk across the financial sector.

 
pdf
CSA-Ready Aviation IT with ManageEngine

CSA-Ready Aviation IT with ManageEngine

Achieve ANAC’s CSA expectations with unified visibility, access control, and actionable monitoring without complexity.

 
pdf
ManageEngine solutions for Brazil's National Cybersecurity Policy

ManageEngine solutions for Brazil's National Cybersecurity Policy

Decree No 11,856 (December 2023) established Brazil's National Cybersecurity Policy (PNCiber) for Critical Information Infrastructure (CII) operators across energy, telecom, finance, healthcare, transportation, water, and government sectors.

 
pdf
Strengthening data protection, visibility, and trust withManageEngine Log360 and AD360

Strengthening data protection, visibility, and trust withManageEngine Log360 and AD360

The Lei Geral de Proteção de Dados (LGPD) is Brazil’s comprehensive data protection law that regulates how organizations collect, process, store, and protect personal data.

 
pdf
Log360 for compliance

Log360 for compliance

Log360, a comprehensive SIEM solution, enables you to combine log management with compliance management, and helps organizations meet various auditing, security, and compliance needs.

 
ADSelfService Plus slide deck

3 key updates in PCI DSS 4.0

Each objective of PCI DSS is now accompanied by an option to follow a customized approach to security controls. Companies can choose to implement one of these options instead of the defined approach.

 
  • E-book
  • Whitepapers
  • Solution briefs
 
pdf
 
 

Essential Eight explained

According to Cybersecurity Ventures, the annual damage caused by cybercrime worldwide will exceed $10.5 trillion by 2025. There is a tremendous amount of data being generated, and this amount will soon exceed 200ZB. Clearly, protecting data is going to be a global challenge for organizations. In order to tackle these challenges, the Australian Cyber Security Center (ACSC) recommends implementing the Essential Eight, a cybersecurity framework that cites eight security measures organizations can implement to mitigate cyberthreats and address security incidents.

 
pdf
 
 

All you need to know and do to comply with the EU General Data Protection Regulation

Increases in the number, scale, and cost of data breaches have made governments across the globe enact stringent compliance laws to protect citizens' personal data. Europe is no exception. Since 2012, the European Commission has been framing new data protections that can improve data processing methods, enhance data security, and also bring harmonization in protecting sensitive data across all European nations.

 
pdf
 
 

Your 2026 guide to complying with BACEN Resolution CMN 4,893/2021

BACEN Resolution CMN 4,893/2021 is one of the most significant cybersecurity mandates governing Brazil’s financial ecosystem, fundamentally reshaping how regulated institutions manage cyber risk, data protection, and operational resilience.

 
pdf
 
 

A guide to complying with Brazil's National Cybersecurity Policy (PNCiber)

Brazil's National Cybersecurity Policy (PNCiber), formalized in December 2023, represents a transformative step in establishing comprehensive cybersecurity governance frameworks across critical infrastructure, government agencies, and essential services.

 
pdf
 
 

ANAC’s Cybersecurity Security Assessment Guide for Brazil

As aviation systems across Brazil become increasingly interconnected, cybersecurity has become a core component of operational safety and regulatory oversight. The Cybersecurity Safety Assessment (CSA), introduced by the Agência Nacional de Aviação Civil establishes a standardized framework to evaluate and strengthen the cybersecurity posture of airlines, airport operators, air navigation service providers, and aviation IT environments.

 
pdf
 
 

The IT security admin's guide to LGPD compliance

LGPD compliance mandates will help you look at alternative measures to protect your organization's data from breaches. This guide will walk you through how to plan the collection, processing, and storage of data better.

 
pdf
 
 

Five tactical wins that move DPDP Act compliance from theory to practice

The Digital Personal Data Protection Act (DPDP Act) isn’t just a legal requirement. It’s a chance to rethink how your organization handles security and data governance. For CISOs, it’s a unique opportunity to turn compliance into meaningful, measurable progress that reduces risk within the first 90 days.

 
pdf
 
 

How to comply with ISO27001:2022 security controls using SIEM

The latest update of the ISO 27001 cybersecurity framework was published on October 25, 2022. The ISO 27000 family of standards consists of best practices and controls organizations can use to implement an information security management system (ISMS) and the CIA (confidentiality, integrity, and availability) triad to protect their data.

 
pdf
 
 

Continuously audit your environment to ensure PCI DSS 4.0 compliance

The latest PCI DSS 4.0 standards are designed to counter evolving threats and incorporate new technologies. Non-compliance can result in severe penalties, including fines, litigation, and loss of customer trust. Log360 helps transform these challenges into opportunities to enhance your security posture.

 
pdf
 
 

The role of IT in achieving SOX compliance

SOX was drafted in response to accounting scandals at prominent companies like Enron and Arthur Andersen, which caused investors to lose billions of dollars. By improving corporate governance and accountability, the act aims to minimize the chance of fraudulent accounting practices by enterprises and auditing firms.

 
pdf
 
 

NIST password guidelines vs current industry practices

It is important to note that the priority levels assigned to each alert are based on general guidelines related to the ISO 27001 standard.

 
pdf
 
 

How IT security solutions can help meet the GDPR's requirements with ease

With the advent of more sophisticated data breaches targeting enterprises, a stringent regulatory mandate was inevitable. The EU's General Data Protection Regulation (GDPR) serves this purpose rightfully. The GDPR aims to unify and standardize personal data collection and processing methods across the EU. The GDPR extends its territorial scope.

 
pdf
 
 

An IT admin's guide to POPIA

The Protection of Personal Information Act (POPIA) is a regulatory mandate to be imposed on organizations in South Africa for ensuring personal data security. The POPIA is all about law.

 
pdf
 
 

A solution book for IT security admins to meet GDPR requirements

This document elaborates on the GDPR's IT security requirements, the measures security administrators need to take to meet these requirements, and how Log360, a comprehensive security information and event management (SIEM) solution, can help you meet these requirements.

 
pdf
 
 

How SIEM helps businesses comply with PCI DSS

The latest PCI DSS 4.0 standards are designed to counter evolving threats and incorporate new technologies. Non-compliance can result in severe penalties, including fines, litigation, and loss of customer trust. Log360 helps transform these challenges into opportunities to enhance your security posture.

 
Video Thumbnail

GDPR and SIEM

 

Video Thumbnail

Beyond 25th May: What you need to prove your GDPR compliance

 

Video Thumbnail

5 steps that will save you from GDPR violation penalities

 

 

Other Resources

Learn about upcoming features

Get trained by product experts