Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Five worthy reads: Embracing the era of everything-as-a-service (XaaS)

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we delve into the increasing adoption of XaaS models across enterprises to achieve agility, pervasive automation, and digitization of business verticals.

Zooming in on UEBA: Answering the "what" and the "how"

User and entity behavior analytics (UEBA) is a relatively new category of cybersecurity tools that utilize machine learning (ML) algorithms to detect abnormalities in the behavior of the users and entities that belong to an enterprise network. UEBA monitors and continuously learns from the behavior of various user accounts and devices in the network, and establishes a baseline behavioral profile for each using statistical and probability models.

Find out which of your employees pose the greatest security risk

Among the different types of cyberattacks, insider threats are the hardest to track and have the highest rate of success. This can be attributed to their use, or rather misuse, of legitimate credentials, machines, and access privileges. Traditional SIEM solutions use simple rule-based alerting to detect potential insider threats, which cannot analyze user behavior or detect any anomalies therein.

User and entity behavior analytics: The intelligent guardian of your business

Identities are easy to fake, but not actions. Closely monitoring the behavior of a person can reveal a lot about their true intentions. Similarly, keeping a close watch on a machine’s activities can expose potential security problems. Blending security information and event management (SIEM) with user and entity behavior analytics (UEBA) can bring numerous users and devices belonging to an enterprise under surveillance.

Five worthy reads: Threat intelligence-the key to proactive cybersecurity

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we explore how cyber threat intelligence can aid organizations. Enterprises often end up spending a great deal of money on monitoring and wiring their perimeter with defensive security solutions. But is merely incorporating security solutions like firewalls, antivirus software, intrusion detection systems, web filtering, and encryption enough?

ServiceDesk Plus named in Capterra's 20 most popular IT asset management solutions list

ServiceDesk Plus’ latest recognition comes from Gartner’s Capterra, which has awarded ServiceDesk Plus a position in its Top 20 IT Asset Management Software report. This recognition affirms ServiceDesk Plus’ commitment to providing all that a business needs as a full-fledged IT service desk tool with a robust built-in IT asset management (ITAM) module.

Dealing with three pathbreaking scenarios under the CCPA

“I’d like to pay with my credit card.” “Sure! Let me have your card. Could I also get your full name, phone number, and address?” “Yeah. It’s Logan Lovato, and I live at 1 Lemon Street, Anaheim. My number is 714.308.75xx.” This was a common occurence at retail stores across the US in the not too distant past. People shared their information and didn’t think much about it.

Five reasons to choose Log360, part 5: Integrated compliance management

So far in this blog series, we’ve seen how Log360 is simple to get up and running, allows you to receive a central view of multiple environments, provides deep auditing capabilities across these environments, and comes with advanced security features to deal with all manner of security incidents. In the concluding post of this blog series, we’ll look at another highly essential component of SIEM solutions: integrated compliance management.

Five worthy reads: Is your enterprise dealing with data sprawl properly?

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we define what data sprawl is and how organizations can cope with it effectively. Data sprawl—defined as the proliferation of data into endpoints, servers, applications, BYODs, operating systems, network environments, and even other geo-servers—can be a challenge to monitor and control.