Operations | Monitoring | ITSM | DevOps | Cloud

ManageEngine

ManageEngine Extends Its SIEM Solution's Log Management Capabilities to the Cloud

PLEASANTON, Calif. - July 17, 2018 - ManageEngine, the real-time IT management company, today announced that it has extended the log management capabilities of its security information and event management (SIEM) solution, Log360, to the cloud.

Adopting a SIEM solution, Part 2: What should you consider when choosing a SIEM tool?

In part one of this two-part series, we discussed why organizations should adopt a SIEM solution to ensure network security. In this second part, we’ll be demystifying the critical capabilities of SIEM tools and show you what to consider when picking a solution.

Start managing Active Directory from your help desk with the new AD management plug-in

ServiceDesk Plus users can now use an AD management plug-in to create and manage Active Directory (AD) users from the ServiceDesk Plus console. This plug-in will automatically add all AD user management actions to this help desk tool’s service catalog. Beyond technicians logging into ServiceDesk Plus to execute requests, regular users can access the tool to raise requests for user management actions.

Five worthy reads: Does your security operations center really make you immune to cyberattacks?

Many enterprises are at the brink of digital transformation, which entails adopting new technologies that process a sea of both personal and enterprise-level data. Despite a surging number of innovations to prevent evolving cyber threats from hijacking that data, the sheer number of successful, high-profile data breaches and attacks recently highlight the insufficient security practices of organizations around the globe.

Adopting a SIEM solution, Part 1: Why choose SIEM?

Many enterprises are at the brink of digital transformation, which entails adopting new technologies that process a sea of both personal and enterprise-level data. Despite a surging number of innovations to prevent evolving cyber threats from hijacking that data, the sheer number of successful, high-profile data breaches and attacks recently highlight the insufficient security practices of organizations around the globe.