Media Coverage

EventTracker 7.6: Digging Into Details for Intrusion Detection

Virtualization Review Finding security problems isn’t easy, with all the information generated by a typical datacenter. It’s worth your time to investigate solutions. A. N. Ananth, CEO of¬†EventTracker, visited to introduce himself and his company, and to discuss the need … Continue reading

IT Supply Chains – Under Siege

A recent Gartner report finds that enterprise IT supply chains will be targeted and compromised, forcing changes in the structure of the IT marketplace and how IT will be managed moving forward. Read more here.

Scott Air Force Base poised for military cybersecurity boom

Belleville New-Democrat As the Air Force downsizes many traditional career fields, it is investing massively in one of its top priorities — cybersecurity. Read more here.

SMBs Can Meet Compliance Regulations with Cloud-Based SIEM Solution

IT Business Edge IT Business Edge interviews EventTracker’s A.N. Ananth about the use of cloud-based SIEM technology, like EventTracker Cloud, to meet regulatory compliance in small and midsized businesses. ¬†Read the full article¬†here. ¬†  

EventTracker Cloud: it’s not a SIEM; it’s an early-warning system

451 Group This paper, written by analyst Javvad Malik of the 451 Group, discusses EventTracker Cloud, a SaaS monitoring product for networks, systems and applications. ¬†At the lowest level, EventTracker Cloud offers free alerting via text or email for up … Continue reading

The State of Encryption, Part 1: Where Are We Now?

IDG Connect NSA revelations have placed an increased emphasis on encryption, with MIT Tech Review labeling 2014 ‚ÄúThe Year of Encryption‚ÄĚ. In a two part special, IDG Connect speaks to seven industry experts, including EventTracker’s CEO, A.N. Ananth, about the … Continue reading

Small Retailers, Big Target

Solution Providers for Retail Ananth’s guest blog discusses why retailers are big targets for hackers and lists some simple steps retailers can take to avoid a POS breach. ¬†Read the full blog, here.

The healthcare USB storage device security conundrum This article, written by A.N. Ananth, discusses how healthcare organizations can protect themselves and meet compliance requirements without compromising the benefits of USB devices.  Read the full article from, here.

How To Avoid Breaches Where You Least Expect Them

DarkReading A.N. Ananth comments as a security expert on how to detect attacks in less critical systems.  Read the full article in Dark Reading here.

Changeable default passwords are not seen as vulnerabilities by ICS-CERT, but should they be?

CSO Online While responding to a vulnerability report submitted in April, ICS-CERT told a researcher that documented, changeable default passwords are not vulnerabilities. But given the risk behind default passwords and the focus on critical infrastructure security, shouldn’t such things … Continue reading