Log360 Resources Library

Learn more about Log360 through our resources.

Product documents

Getting the best out of your SIEM
Free E-book
Getting the best out of your SIEM

This e-book guides you through the different capabilities of a SIEM solution and how you can configure each of them. It provides important tips and tricks that you can apply to get the most out of your SIEM.

Cybersecurity threats in Indian healthcare: 6 strategies to tackle them
Free E-book
Cybersecurity threats in Indian healthcare: 6 strategies to tackle them

Read this e-book to uncover the security challenges that the healthcare sector confronts, including the increasing adoption of IoT devices and six strategies to tackle them.

CISO Handbook: Cybersecurity Metrics, Budgeting, and Leadership
Free E-book
CISO Handbook: Cybersecurity Metrics, Budgeting, and Leadership

CISOs are no longer confined to the role of security leaders. With data security increasingly becoming a business-critical risk, CISOs are transitioning to business leaders. Read our e-book to learn what this transition means, the key cybersecurity metrics CISOs should track, effective cybersecurity budgeting strategies, and more.

Encryption standards of Log360 modules
Encryption standards of Log360 modules

The documents below detail the encryption standards used in the different modules of Log360.

SIEM evaluator's guide
Solution briefs View all
SIEM evaluator's guide

In the face of evolving attacks, organizations need a solution that can detect and address incidents before they become critical; without a doubt, a security information and event management (SIEM) solution is the best way to do it. This guide covers important considerations in choosing a SIEM solution.

Log forensics best practices
Best practices guide View all
Log forensics best practices

This guide shows you how to leverage a SIEM solution to perform efficient investigations as well as best practices to follow to ensure that you have a robust incident forensics system in place.

View all  

Videos

  • videos1
    Webinar
    Log management best practices for SIEM
  • videos2
    Webinar
    Auditing and securing SQL and IIS
  • videos3
    Webinar
    Auditing 101: Stay compliant and secure your enterprise with SIEM
View all  

E-books

View all  

Whitepapers

Threat intelligence and the SIEM advantage
Whitepaper
Threat intelligence and the SIEM advantage

Having threat intelligence capabilities is a necessity in any organization. Threat intelligence is crucial in protecting your organization from malicious attacks.

Using indicators to deal with security attacks
Whitepaper
Using indicators to deal with security attacks

Indicators of compromise (IoCs) and indicators of attack (IoAs) help organizations instantly detect an attack, blueprint an attack sequence, identify an attack before damage is caused, and more.

View all 

Case studies

  • Recognized in 2020 Gartner Magic Quadrant for SIEM, fourth time in a row

    Read the full report here.
  • ManageEngine named a 2020 Gartner Peer Insights Customers’ Choice for Security Information and Event Management!

    Read more
  • Software Reviews — Emotional Footprint Awards 2020

  • Recognized in 2020 Gartner Magic Quadrant for SIEM, fourth time in a row

    Read the full report here.
  • ManageEngine named a 2020 Gartner Peer Insights Customers’ Choice for Security Information and Event Management!

    Read more
  • Software Reviews — Emotional Footprint Awards 2020

View all 

Infographics

 

Watch Now