Support Get Quote

Other Resources

White papers on SIEM, Compliance, Security Attack Mitigation & More

Improving incident detection with event correlation

Today, organizations are assigning higher priority to incident detection and response, as better methods of identifying and containing security incidents. One way to improve incident detection is through event correlation. This white paper explains the process of event correlation, how you can work correlation into the fabric of your security strategy, and how EventLog Analyzer's correlation module can be leveraged to fit perfectly with your security needs.

Request for event correlation white paper

Using indicators to deal with security attacks

Using indicators to deal with security attacks

An organization can never be immune to security attacks. This white paper deals with the signs of a potential threat or an on-going security attack that serves as indicators. These indicators are broadly classified into two categories viz., Indicators of Compromise (IoCs) and Indicators of Attack (IoAs). IoCs help deal with an ongoing attack, whereas IoAs help prevent an attack even before it occurs. This white paper also elaborates on how a security administrator can configure their SIEM solution to track both IoCs and IoAs and build correlation rules to help mitigate security attacks.

Request for Security attack indicators White paper

SIEM White Paper

Security Information and Event Management (SIEM) solutions provide enterprises with network security intelligence and real-time monitoring for network devices, systems and applications.

ManageEngine's SIEM handbook discusses the challenges that IT administrators face while managing terabytes of log data to ensure security and the business benefits that an enterprise can gain as it deploys SIEM solution. It also discusses 14 critical capabilities common to most SIEM solutions and how ManageEngine EventLog Analyzer SIEM solution can help enterprises meet their IT security needs effectively.

Request for SIEM White paper

PCI DSS 3.0 Whitepaper

PCI DSS 3.0 White Paper

PCI DSS compliance has gained worldwide acceptance by card service providers – card issuers, banks, and merchants – that plan to protect their customers’ cardholder data from being misused. PCI DSS 3.0 has 12 security requirements concerning the protection of cardholder data. All businesses that accept, store, process, or transmit customers card data either online or offline have to adhere to those requirements.

In this whitepaper we will discuss in detail on how businesses can use EventLog Analyzer, the compliance management solution from ManageEngine, to comply with the PCI DSS requirements 10 and 11.5, thereby securing cardholder data and mitigating payment card fraud.

Request for PCI DSS White paper

SOX White Paper

This white paper discusses Sarbanes-Oxley (SOX) Act - Section 404 and Section 302 that lays the foundation on how IT can aid SOX compliance.It also discusses the SOX requirements for IT.

It also explains how ManageEngine EventLog Analyzer helps you to be compliant with SOX audit with its out-of-the box reports.

Request for SOX White paper

Customer Speaks
  • Credit Union of Denver has been using EventLog Analyzer for more than four years for our internal user activity monitoring. EventLog Analyzer provides great value as a network forensic tool and for regulatory due diligence. This product can rapidly be scaled to meet our dynamic business needs.
    Benjamin Shumaker
    Vice President of IT / ISO
    Credit Union of Denver
  • The best thing, I like about the application, is the well structured GUI and the automated reports. This is a great help for network engineers to monitor all the devices in a single dashboard. The canned reports are a clever piece of work.
    Joseph Graziano, MCSE CCA VCP
    Senior Network Engineer
  • EventLog Analyzer has been a good event log reporting and alerting solution for our information technology needs. It minimizes the amount of time we spent on filtering through event logs and provides almost near real-time notification of administratively defined alerts.
    Joseph E. Veretto
    Operations Review Specialist
    Office of Information System
    Florida Department of Transportation
  • I love the alerts feature of the product. We are able to send immediate alerts based on pretty much anything we can think of. We send alerts when certain accounts login, or when groups are changed, etc. That has been very helpful. Also the automatic archive of the log files has been very helpful and has taken the worry out of keeping old logs. The “Ask Me” function is very nice as well. It is great to have some natural language queries built in where you can just click a button and get an answer.
    Jim Earnshaw
    Senior Computer Specialist
    Department of Chemistry
    University of Washington
  • Windows Event logs and device Syslogs are a real time synopsis of what is happening on a computer or network. EventLog Analyzer is an economical, functional and easy-to-utilize tool that allows me to know what is going on in the network by pushing alerts and reports, both in real time and scheduled. It is a premium software Intrusion Detection System application.
    Jim Lloyd
    Information Systems Manager
    First Mountain Bank

EventLog Analyzer Trusted By

A Single Pane of Glass for Comprehensive Threat Management