Cloud edition of Log360
Explore cloud-based SIEM solution.
Sign up for free
Download
Overview
Features
Demo
Resources
Resource Library
Case Studies
E-books
Whitepapers
Solution Documents
All resources
Expert Talks
SIEM
Attack Detection
Know more
SIEM basics
What is SIEM?
Functions of SIEM
SIEM architecture
Learn more
Attack library
Cloud Security
Academy
Documentation
Integrations
Get Quote
Support
Email Download Link
Log360 Resources Library
Learn more about Log360 through our resources.
Documents
Home
» Documents
Search our library
Home
Product documents
Technical documents
Best practices guide
Supported log & data sources
Solution architecture
FAQs
Datasheets
Use case documents
Solution briefs
User manual
Videos
How-to videos
Ebooks
Whitepapers
Case studies
Awards
Infographics
Virtual seminar
Podcast
On-demand events hub
E-books
Ebooks
E-book
How to comply with ISO 27001:2022 security controls using SIEM
Access resource
E-book
Continuously audit your environment to ensure PCI DSS 4.0 COMPLIANCE
Access resource
E-book
Using MITRE ATT&CK to understand 2023's biggest breaches
Access resource
E-book
How to improve risk scoring and threat detection with UEBA
Download PDF
E-book
The dark side of AI
Download PDF
E-book
How to detect and respond to Cryptojacking Attacks
Download PDF
E-book
Essential eight explained
Download PDF
E-book
GDPR handbook
Download PDF
E-book
10 crucial audit reports for IT security
Download PDF
E-book
The basics of auditing and securing your network perimeter with SIEM
Download PDF
E-book
Top 5 critical alerts you need for IT security
Download PDF
E-book
The IT security admin's guide to LGPD compliance
Download PDF
Download
Demo
Free Edition
Get Quote
Support
Email Download Link