Cloud Security with ManageEngine Log360

Everything you want to know about Cloud Security

 

What is a cloud access security broker (CASB)?

Learn more  

A cloud access security broker or CASB is an on-premises or cloud-hosted security software or solution that acts as a gatekeeper and monitors the interaction between users and cloud applications.

CASBs for multi-cloud: 3 tips to choose the right CASB solution

Learn more  

A cloud access security broker (CASB) provides organizations with a much-needed opportunity to harden security across cloud-based applications.

What is a CASB, and where does it fit in your cybersecurity strategy?

Learn more  

When shifting to the cloud, organizations need to ensure that cloud applications can be accessed only by authorized users. As your network perimeter changes, you need to implement security policies that adapt to the ever-evolving threat landscape.

 14 Best practices to secure your cloud environment

Learn more  

The increased adoption of the cloud can potentially increase the risk of insider threat due to employee negligence in an organization.

Shadow IT: A detailed guide

Learn more  

Shadow IT encompasses the use of hardware, software, and digital systems within an organization without the approval or knowledge of the central IT department.

Shedding light on shadow IT and data exfiltration with CASB

Learn more  

The days when employees and assets functioned only within the company network are long gone. Now, all that is required is a username and password to utilize the required IT resources from a remote location.

VPC security groups in Amazon Web Services

Learn more  

A security group is like a virtual firewall. It works much like a traditional firewall does.

The shared responsibility model between customers and vendors in AWS cloud

Learn more  

Security is one of the most important requirements for the smooth and efficient functioning of organizations, but many think cloud adoption is risky due to some long-standing confusion around cloud security.

Amazon VPC: Network access control lists

Learn more  

Amazon Virtual Private Cloud (Amazon VPC) provides an isolated cloud environment within the AWS public cloud framework. It enables enterprises to secure their resources and data even though they are hosted on a public cloud platform.

What is VPC Flow Logs, and how can you publish flow logs to CloudWatch and S3?

Learn more  

VPC Flow Logs is a feature that allows you to monitor and record traffic that enters and exits the Amazon Virtual Private Cloud (VPC), subnet, or a network interface within Amazon Web Services (AWS).

CASB architecture: How it works?

Learn more  

A cloud access security broker (CASB) implementation can be done in three ways: forward proxy, reverse proxy, and API scanning. The architecture for the three CASB implementation methods are different and address different use cases.

How to improve cloud security in healthcare with CASB?

Learn more  

Cloud computing has led to a paradigm shift in the way organizations store, process, and access data. It provides scalability, flexibility, and cost-efficiency. This holds true for healthcare organizations as well.

CASB for cloud migration: Why it should be a priority

Learn more  

The global growth of cloud infrastructure has been explosive. The pandemic that promoted remote working models has accelerated the adoption of cloud infrastructure platforms and services exponentially.

CASB: Why should it be part of your SIEM?

Learn more  

The analyst firm, Gartner, first defined the phrase "cloud access security broker," or CASB, in 2012. It has become a well-known and well-adopted technology for cyberdefense.

AWS cloud security: Detecting SSH brute force attacks

Learn more  

Cloud infrastructures are primarily dominated by Linux-based machines, owing to advantages such as open source, lower costs, reliability, and flexibility.

Cloud security: Detecting cloud snooper attacks

Learn more  

Cloud Snooper is a sophisticated attack carried out on various Linux and Windows EC2 instances hosted by Amazon Web Services (AWS).

Azure cloud security: Detecting SSH brute force attacks

Learn more  

Organizations are shifting their IT infrastructure from on-premises to the cloud to gain advantages in cost, productivity, and uptime.

What is cloud security?

Learn more  

Cloud security is defined as a collection of policies, processes, controls, and technologies used to protect data and infrastructure in computing environments.

CASB in cybersecurity: The top use cases

Learn more  

CASB use cases for organizations can encompass a wide range of functionalities from discovery and visibility, to monitoring and control over cloud activity.

How to log and monitor Amazon VPC

Learn more  

Amazon Virtual Private Cloud (VPC) is a commercial cloud computing service that enables users to create a logically isolated section of the AWS Cloud within which they can launch AWS resources in a virtual network defined by themselves

What is cloud security posture management?

Learn more  

Cloud security posture management (CSPM) is the process of continuous risk assessment in multi-cloud environments.

What is Amazon Virtual Private Cloud(VPC)?

Learn more  

Amazon Virtual Private Cloud (VPC) is a commercial cloud computing service that enables users to create a logically isolated section within the AWS Cloud.

How to configure Amazon VPC?

Learn more  

Amazon Virtual Private Cloud (VPC) is a commercial cloud computing service that enables users to create a logically isolated section of the AWS Cloud.

How to monitor Amazon VPC with ManageEngine Log360

Learn more  

An unsecured VPC might be subject to cyberthreats. Monitoring Amazon VPC (Virtual Private Cloud) allows you to proactively identify and resolve issues, optimize resource use, and ensure compliance with security and regulatory standards.

How is Amazon VPC used in educational institution?

Learn more  

Amazon Virtual Private Cloud (VPC) can be used in the healthcare sector to improve the security, scalability, and interoperability of IT infrastructures while ensuring adherence to industry regulations like HIPAA.

How is Amazon VPC used in healthcare sector?

Learn more  

Educational institutions are huge data mines that contain personally identifiable information, such as the social security numbers, health records, scholarship data, or payment data of numerous students, parents, and faculty members.

How is Amazon VPC used in banking and finance?

Learn more  

Amazon VPC (Virtual Private Cloud) is utilized in the banking and financial industry to create safe, scalable, and compliant infrastructure for a variety of services and applications.

Cloud security in educational sector

Learn more  

Educational institutions are huge data mines that contain personally identifiable information, such as the social security numbers, health records, scholarship data, or payment data of numerous students, parents, and faculty members.

Cloud access security brokers (CASBs): How to leverage one in banking and finance

Learn more  

The true wealth of a banking organization transcends currency; it resides in the depth and breadth of the data it possesses and the significance of its operations.

Cloud security in healthcare: 10 AWS activities you should track

Learn more  

Healthcare organizations are increasingly adopting cloud computing and cloud services for storing electronic health records and processing medical data.

Cloud security and compliance

Learn more  

Cloud compliance is the process of ensuring that your organization's cloud usage is in accordance with the industry standards and other laws associated with the cloud.

Cloud security architecture

Learn more  

The creation and implementation of strategies, technologies, and practices with the aim of securing your cloud environment is referred to as cloud security architecture.

No result found

About Cloud Security

Cloud infrastructures and applications contain business sensitive data that needs constant monitoring. Monitoring data security on the cloud is essential to adhere to IT regulations and ensure business continuity. Detecting and mitigating cyberattacks on cloud platforms requires real-time event response and incident management modules as part of your security arsenal.

Watch out this space for content that can help you understand how you can ensure cloud security.