Log360 Resources Library

Learn more about Log360 through our resources.

Product documents

Getting the best out of your SIEM
Free E-book
Getting the best out of your SIEM

This e-book guides you through the different capabilities of a SIEM solution and how you can configure each of them. It provides important tips and tricks that you can apply to get the most out of your SIEM.

How to detect and respond to cryptojacking attacks
Free E-book
How to detect and respond to cryptojacking attacks

In this e-book, we break down the various aspects associated with cryptojacking, including relevant concepts such as blockchain technology. You'll also understand how organizations can leverage their SIEM solution to curb and combat cryptojacking.

SIEM evaluator's guide
Solution briefs View all
SIEM evaluator's guide

In the face of evolving attacks, organizations need a solution that can detect and address incidents before they become critical; without a doubt, a security information and event management (SIEM) solution is the best way to do it. This guide covers important considerations in choosing a SIEM solution.

Log forensics best practices
Best practices guide View all
Log forensics best practices

This guide shows you how to leverage a SIEM solution to perform efficient investigations as well as best practices to follow to ensure that you have a robust incident forensics system in place.

resources-banner

View all  

Videos

  • videos1
    Webinar
    Log management best practices for SIEM
  • videos2
    Webinar
    Auditing and securing SQL and IIS
  • videos3
    Webinar
    Auditing 101: Stay compliant and secure your enterprise with SIEM
View all  

E-books

View all  

Whitepapers

Threat intelligence and the SIEM advantage
Whitepaper
Threat intelligence and the SIEM advantage

Having threat intelligence capabilities is a necessity in any organization. Threat intelligence is crucial in protecting your organization from malicious attacks.

Using indicators to deal with security attacks
Whitepaper
Using indicators to deal with security attacks

Indicators of compromise (IoCs) and indicators of attack (IoAs) help organizations instantly detect an attack, blueprint an attack sequence, identify an attack before damage is caused, and more.

View all 

Case studies

  • Recognized in 2020 Gartner Magic Quadrant for SIEM, fourth time in a row

    Read the full report here.
  • ManageEngine named a 2020 Gartner Peer Insights Customers’ Choice for Security Information and Event Management!

    Read more
  • Software Reviews — Emotional Footprint Awards 2020

  • Recognized in 2020 Gartner Magic Quadrant for SIEM, fourth time in a row

    Read the full report here.
  • ManageEngine named a 2020 Gartner Peer Insights Customers’ Choice for Security Information and Event Management!

    Read more
  • Software Reviews — Emotional Footprint Awards 2020

View all 

Infographics

Watch Now

Watch Now