Solution documents

??? pgHead ???
 

SIEM evaluator's guide

In the face of evolving attacks, organizations need a solution that can detect and address incidents before they become critical; without a doubt, a security information and event management (SIEM) solution is the best way to do it. This guide covers important considerations in choosing a SIEM solution.

Download PDF

   
 

Safeguarding devices against ransomware using Log360

This guide illustrates how ransomware operates and lays out how to prevent, detect, investigate, and respond to ransomware attacks using Log360.

Download PDF

   
 

GDPR solution book

Learn how our solutions can be leveraged to ensure personal data safety, audit access to personal data, and monitor user activities in the systems where personal data is stored.

Download PDF

   
 

An IT admin's guide to POPIA

The Protection of Personal Information Act (POPIA) is a South African regulatory mandate to ensure personal data security. This guide explains the act, how it affects your enterprise IT processes, and how Log360 can help meet POPIA's security safeguard conditions.

Download PDF

   
 

How Log360 helps Australian organizations with the Notifiable Data Breaches scheme

The Notifiable Data Breaches (NDB) scheme is pushing organizations in Australia to reevaluate their security posture and fill any gaps in their security strategy by implementing proper processes and deploying appropriate tools. This document provides an overview on how organizations can leverage a SIEM solution like ManageEngine Log360 to meet the NDB scheme requirements.

Download PDF

   
 

How SIEM helps businesses comply with PCI DSS

PCI DSS is a regulation with twelve requirements that serve as a security baseline to secure payment card data. Achieving PCI DSS compliance involves deploying several security controls and various security solutions. This guide elaborates on requirements 10 and 11.5 as well as how Log360 can help satisfy these requirements.

Get the PDF