Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

The role of SIEM in PCI DSS compliance

Studies have shown a direct correlation between data breaches and non-compliance. This isn’t to say that compliant companies never get breached, but to reinforce the importance of incident detection and response. Businesses have begun to realize the devastating consequences of data breaches—their finances and reputation are at stake, so many have been taking steps over the last few years to comply with the PCI DSS. The main goal is often an emphasis on achieving continuous compliance.

Sumo Logic Experts Reveal Their Top Enterprise Tech and Security Predictions for 2019

We finally made it to another new year, and that means it’s time to reflect on the learnings from the previous year while also preparing for many new opportunities and challenges ahead. The enterprise tech and security industry didn’t seem to slow in 2018, so there’s no reason we would expect 2019 to be any different. So what will those “hot button” topics be this year?

What is SIEM?

The impact of the colossal Starwood Hotels & Resorts data breach continues to reverberate across the global technology community. In its wake, the importance of log management and security information event management (SIEM) systems has once again come to the forefront. Let’s explore what SIEM is, the many acronyms emerging in the SIEM space and where logging fits into the picture.

2018: A look back at what we've done in ITOM

2018 was a busy year for the ManageEngine IT operations management team. We tackled everything from major concerns like poor network performance, security, cost, enterprise growth, configuration management, and vendor lock-in to enterprise-specific issues such as providing uninterrupted connectivity to critical apps and departments, managing BYOD policies, and predicting future bandwidth needs.

The relationship between steganography and cyberattacks

There’s no denying the importance of communication. Businesses cannot function without the proper means of communication, such as phone calls, faxes, emails, text messages, and more. However, not all forms of communication are secure, meaning the information transferred by them doesn’t always stay confidential. This is where steganography comes into play.