Operations | Monitoring | ITSM | DevOps | Cloud

ManageEngine

ManageEngine Extends Its SIEM Solution's Log Management Capabilities to the Cloud

PLEASANTON, Calif. - July 17, 2018 - ManageEngine, the real-time IT management company, today announced that it has extended the log management capabilities of its security information and event management (SIEM) solution, Log360, to the cloud.

Adopting a SIEM solution, Part 2: What should you consider when choosing a SIEM tool?

In part one of this two-part series, we discussed why organizations should adopt a SIEM solution to ensure network security. In this second part, we’ll be demystifying the critical capabilities of SIEM tools and show you what to consider when picking a solution.

Start managing Active Directory from your help desk with the new AD management plug-in

ServiceDesk Plus users can now use an AD management plug-in to create and manage Active Directory (AD) users from the ServiceDesk Plus console. This plug-in will automatically add all AD user management actions to this help desk tool’s service catalog. Beyond technicians logging into ServiceDesk Plus to execute requests, regular users can access the tool to raise requests for user management actions.

Five worthy reads: Does your security operations center really make you immune to cyberattacks?

Many enterprises are at the brink of digital transformation, which entails adopting new technologies that process a sea of both personal and enterprise-level data. Despite a surging number of innovations to prevent evolving cyber threats from hijacking that data, the sheer number of successful, high-profile data breaches and attacks recently highlight the insufficient security practices of organizations around the globe.

Adopting a SIEM solution, Part 1: Why choose SIEM?

Many enterprises are at the brink of digital transformation, which entails adopting new technologies that process a sea of both personal and enterprise-level data. Despite a surging number of innovations to prevent evolving cyber threats from hijacking that data, the sheer number of successful, high-profile data breaches and attacks recently highlight the insufficient security practices of organizations around the globe.

Is global expansion crippling your hold on network security?

Globalization and foreign investments have completely changed the way enterprises are run today. Enterprises are expanding geographically to diversify their risk portfolio, but this expansion hasn’t been linear. From mergers to buyouts, today’s enterprises have endless possibilities, which translates into inorganic, exponential growth—something that’s become the industry norm.

Five worthy reads: Is IT Ops at the brink of a digital revolution?

A wave of digital transformation is rolling in—a wave of universal connectivity, personalization, and adoption of intelligent technologies that many organizations have never navigated before. Adopting digital technologies often entails restructuring business verticals and scaling up data processing. One such vertical, IT operations (IT Ops), is finding it challenging to manually handle and process huge volumes of complex data.