The most recent content from our members.
Who is Ubisoft? Ubisoft Entertainment is a French global video game publisher and developer, and is one of the largest independent game publishers in Europe and the United States. Do you remember playing Assassin’s Creed and Price of Persia? Those were from Ubisoft. Hacking? What Happened? One of Ubisoft’s websites was…
With targeted security attacks getting increasingly advanced and persistent, businesses have started investing more in procuring the right security technologies to protect them from these new threats. According to Gartner Inc., the global security technology and services market will reach $67.2 billion in 2013, up 8.7%…
What are “Rules” in Log & Event Manager? Rules, in SolarWinds Log & Event Manager (LEM), are customizable event correlation algorithms that correlate events sent by LEM Agents and remote logging devices. Whether you are monitoring the LEM console or not, LEM rules track events in real time allowing you to * Correlate…
In an earlier blog, we discussed how important it is to monitor logs from workstations. To address this much demanded security use case, SolarWinds introduced Log & Event Manager Workstation Edition with the release of LEM 5.6. What is Log & Event Manager Workstation Edition? LEM Workstation Edition is a special licensing…
Deploying SolarWinds Log & Event Manager (LEM) is a cinch! Watch this short video by LEM subject matter expert Rob Johnson to help you walk through the deployment process. LEM Virtual Appliance LEM is packaged as a virtual appliance that can be deployed using VMware or Hyper-V platforms. LEM virtual appliance consists of…
I was recently changing my keys to a new key ring and included in this move was a 4GB USB flash drive. This reminded me just how ubiquitous these flash drives have become. After all, how many times have you been given a USB drive at a trade show, by a friend, or through some other unsuspecting channel? To the network…
The first and foremost reason "WHY" any organization and its IT security teams will want to monitor workstation logs is because they want to Protect Confidential Data & Prevent Data Loss! Workstations are vulnerable to many security threats and there are many compliance mandates that demand monitoring workstation activity…
Data Loss Prevention (DLP) is a computer security term referring to systems that enable organizations to reduce the corporate risk of the unintentional disclosure (or data loss) of confidential information. How Does Data Loss Happen? Data loss happens when security is compromised and corporate sensitive data is accessed.…
If you have been following the headlines in the last one week, you’d know there have been 2 major security attacks on website and web services of popular trading companies. Breach Incident #1: Mt. Gox Servers were Compromised with Massive DDOS Attacks Mt. Gox is one of the world's largest bitcoin exchange that trades…
Everyone in the IT industry seems to talk about log and event management, but what makes it so important? Is it really something we need to be concerned about? Join SolarWinds Geeks (a.k.a. Sales Engineers) Chris Jeffreys and Rob Johnson, as they discuss the importance of log and event management, why it is so vital,…
It looks like you're new here. Sign in or register to get started.