Tag: eventloganalyzer

Protective, GPG13-Compliant Monitoring Using EventLog Analyzer

​ The journey to a thousand IT problems begins with a single compliance lapse. Yes, this is the first time you are hearing it! So, tell us how often you’ve walked straight into trouble because you underestimated the importance of compliance

Combat Advanced Cyber Attacks With Shared Security Intelligence

(Originally published in Cyber Defense Magazine , Black Hat special edition) ​In this information age, even the mightiest of enterprises and governments across the globe are worried about cyber-attacks. Not a single day passes by without a story about a hack or a compromise or an identity theft involving data related to a large number of users. Cyber security is increasingly becoming complex, and cyber-attacks have truly emerged a global crisis.

ManageEngine’s EventLog Analyzer Advances the Cloud with ActiveState Stackato

The cloud, once known as the future of IT, is now part of modern IT infrastructure. With the growing acceptance of BYOD and employees soliciting critical business-service access on the move, the cloud is ideally suited to balancing these current market trends

ManageEngine EventLog Analyzer Secures Golden Award

EventLog Analyzer grabs windowssecurity.com golden award We are excited to announce that ManageEngine EventLog Analyzer recently took home the Golden Award from WindowsSecurity.com . Deb Shinder, MVP (Enterprise Security) reviewed the product before bestowing this award. We want to thank WindowsSecurity.com for giving us an opportunity to have our product thoroughly reviewed by Shinder, a seasoned security professional

Spate of shocking cyber attacks on universities jolt academia

It is hauntingly clear – cyber criminals have set their eyes firmly on universities, research institutions, and centers of higher learning in the United States and other parts of the world. If the cyber attacks of the past few weeks are any indication, universities are now facing the biggest threat to information security

Your Net Worth Is Online – And Less Safe Than Ever

The Black Hat USA 2013 conference, which kicks off tomorrow in Las Vegas, brings together the  brightest minds in IT security  each year — those who are responsible for perpetrating and protecting against the latest hacks and vulnerabilities. And not a second too soon, since every week seems to usher in another security catastrophe. This week’s shocker  was the outing of a hole in mobile device SIM cards, by Karsten Nohl, the founder of Security Research Labs in Berlin

Security Gaffes You Might Have Missed So Far This Year

If you can believe it, 2013 is already halfway over. With summer here, businesses everywhere are feeling the heat in their IT organizations – as they fight a growing array of security concerns, threatening their profitability and reputation alike.

This Week’s Five: Security Begins At Home

This Week’s Five  is a weekly column of five interesting reads from all over the web, with a different topic every week. This week, we explore  the risks of security breach and importance of data protection  in enterprise networks. Cyber thieves of all kinds have made the lives of the people in charge of data security miserable; except when they get caught.

If Big Data’s too scary, try Little Data (it’s free)

Here are some stats that will blow your mind: Every minute of every day, 48 hours of video content is uploaded to YouTube, Google receives over 2 million queries, over 100,000 tweets are sent and nearly 600 new websites are created. Perhaps most shocking is that quietly in the background, all of this data is tracked and stored. But what happens to it after that?