Media Coverage


EventTracker 7.6: Digging Into Details for Intrusion Detection

Virtualization Review Finding security problems isn’t easy, with all the information generated by a typical datacenter. It’s worth your time to investigate solutions. A. N. Ananth, CEO of EventTracker, visited to … Continue reading



IT Supply Chains – Under Siege

A recent Gartner report finds that enterprise IT supply chains will be targeted and compromised, forcing changes in the structure of the IT marketplace and how IT will be managed … Continue reading



Scott Air Force Base poised for military cybersecurity boom

Belleville New-Democrat As the Air Force downsizes many traditional career fields, it is investing massively in one of its top priorities — cybersecurity. Read more here.



SMBs Can Meet Compliance Regulations with Cloud-Based SIEM Solution

IT Business Edge IT Business Edge interviews EventTracker’s A.N. Ananth about the use of cloud-based SIEM technology, like EventTracker Cloud, to meet regulatory compliance in small and midsized businesses.  Read … Continue reading



EventTracker Cloud: it’s not a SIEM; it’s an early-warning system

451 Group This paper, written by analyst Javvad Malik of the 451 Group, discusses EventTracker Cloud, a SaaS monitoring product for networks, systems and applications.  At the lowest level, EventTracker … Continue reading



NetworkWorld – Products of the Week

NetworkWorld EventTracker Cloud is featured as one of NetworkWorld’s Products of the Week.  See it here!



The State of Encryption, Part 1: Where Are We Now?

IDG Connect NSA revelations have placed an increased emphasis on encryption, with MIT Tech Review labeling 2014 “The Year of Encryption”. In a two part special, IDG Connect speaks to … Continue reading



Small Retailers, Big Target

Solution Providers for Retail Ananth’s guest blog discusses why retailers are big targets for hackers and lists some simple steps retailers can take to avoid a POS breach.  Read the … Continue reading



The healthcare USB storage device security conundrum

HealthITSecurity.com This article, written by A.N. Ananth, discusses how healthcare organizations can protect themselves and meet compliance requirements without compromising the benefits of USB devices.  Read the full article from HealthITSecurity.com, … Continue reading



How To Avoid Breaches Where You Least Expect Them

DarkReading A.N. Ananth comments as a security expert on how to detect attacks in less critical systems.  Read the full article in Dark Reading here.