Operations | Monitoring | ITSM | DevOps | Cloud

SIEM

We're an April 2019 Gartner Peer Insights Customers' Choice for SIEM-thanks to you!

We’re happy to announce that ManageEngine is an April 2019 Gartner Peer Insights Customers’ Choice for Security Information and Event Management (SIEM). While Gartner analysts recognized ManageEngine in its Magic Quadrant for Security Information and Event Management * for three consecutive years, this Customers’ Choice distinction makes us even more proud because we see it as proof that our customers are happy with the technology we provide.

Sponsored Post

EventSentry v4.0 - Introducing ADMonitor

Since Active Directory is the foundation of all Windows networks, monitoring Active Directory needs to be part of any comprehensive security strategy. Up to version 3.5, EventSentry utilized Windows auditing and the security event log to provide reports on: User Account Changes, Group Changes and Computer Account Changes.

Behind the scenes of our security incident management process

On the security team, we don’t manage any Atlassian products like other Atlassian teams do. Our main product is trust, and that’s a job that’s never finished. To me, security is more of a mindset; one of constant diligence, continuous improvement, and seeking out ways to innovate.

SIEM vs. Security Analytics

SIEM has been with us for almost two decades now and is seen as a proven approach to dealing with potential threats as well as actual attacks on business critical systems. But today, it is becoming clear that changes in IT infrastructure and deployment practices are giving rise to new challenges that cannot be met by existing SIEM platforms.

ManageEngine recognized in Gartner Magic Quadrant for Security Information and Event Management three years in a row

We’re happy to announce that ManageEngine has been positioned in Gartner’s Magic Quadrant for Security Information and Event Management[i] (SIEM) and its Critical Capabilities for Security Information and Event Management[ii] research report for the third consecutive year.

Next-Level Threat Hunting: Shift Your SIEM from Reactive to Proactive

Threat hunting is proactively identifying and thwarting unusual network activity that could indicate an attempted security breach. It's a historically manual activity, making it time-intensive and arduous. It’s no wonder, then, why most organizations don’t have the time, budget, or resources to undertake it effectively…if at all.

The role of SIEM in PCI DSS compliance

Studies have shown a direct correlation between data breaches and non-compliance. This isn’t to say that compliant companies never get breached, but to reinforce the importance of incident detection and response. Businesses have begun to realize the devastating consequences of data breaches—their finances and reputation are at stake, so many have been taking steps over the last few years to comply with the PCI DSS. The main goal is often an emphasis on achieving continuous compliance.

What is SIEM?

The impact of the colossal Starwood Hotels & Resorts data breach continues to reverberate across the global technology community. In its wake, the importance of log management and security information event management (SIEM) systems has once again come to the forefront. Let’s explore what SIEM is, the many acronyms emerging in the SIEM space and where logging fits into the picture.