Cloud edition of Log360
Explore cloud-based SIEM solution.
Sign up for free
Download
Overview
Features
Demo
Resources
Resource Library
Case Studies
E-books
Whitepapers
Solution Documents
All resources
Expert Talks
SIEM
Attack Detection
Know more
SIEM basics
What is SIEM?
Functions of SIEM
SIEM architecture
Learn more
Attack library
Cloud Security
Academy
Documentation
Get Quote
Support
Email Download Link
Log360 Resources Library
Learn more about Log360 through our resources.
Documents
Home
» Documents
Search our library
Home
Product documents
Technical documents
Best practices guide
Supported log & data sources
Solution architecture
FAQs
Datasheets
Use case documents
Solution briefs
User manual
Videos
How-to videos
Ebooks
Whitepapers
Case studies
Awards
Infographics
Virtual seminar
Podcast
Use case documents
Product documents
Use case documents
Use case
Account Compromise Detection using Log360
Download PDF
Use case
Intrusion Detection using Log360
Download PDF
Use case
Anomaly Detection using Log360
Download PDF
Use case
Identifying and Protecting Patient Health Information with Log360
Download PDF
Use case
Using Log360 to discover sensitive data in the network
Download PDF
Use case
Auditing Change Control with Log 360
Download PDF
Use case
Detect Malware using Log360
Download PDF
Use case
Spot Privilege Escalations using Log360
Download PDF
Use case
Detect Changes to Sensitive Data stored in Databases using Log360
Download PDF
Use case
Securing Resources and Data on the Cloud using Log360
Download PDF
Use case
Fraud Detection and Prevention using Log360
Download PDF
Use case
Monitor Integrity of Files and Folders using Log360
Download PDF
Use case
Identifying a patient-zero machine using Log360
Download PDF
Use case
Discovering and securing credit card information using Log360
Download PDF
Use case
Detecting APTs using MITRE ATT&CK TTPs | ManageEngine Log360
Download PDF
✕
Watch Now
✕
Watch Now
Download
Demo
Free Edition
Get Quote
Support
Email Download Link