Resources

See All

Blog

Blog

Monitoring DNS Traffic for Security Threats

Cyber criminals are constantly developing increasingly sophisticated and dangerous malware programs. Statistics for the first quarter of 2016 compared to 2015 shows that malware attacks have quadrupled. Why DNS traffic … Continue reading

See All

Media Coverage

MediaCoverage

Meeting Ransomware Threats with SIEM

LegalTech News It used to be that security technologies comprised a preventative toolset including firewall, antivirus, web and email gateways. There was a clear distinction between “do-it-yourself” security approaches and … Continue reading

See All

Case Studies

In this case study, see how a member-owned electric distribution cooperative used EventTracker Security Center, paired with EventTracker’s co-managed service, SIEM Simplified, to meet PCI-DSS standards and maintain IT security. … Continue reading

A case study written by The 451 Group  shows how EventTracker’s SIEM Simplified service simplifies for labor union. EventTracker Simplifies SIEM for Labor Union was last modified: March 16th, 2016 … Continue reading

See All

Press Releases

Press Releases

EventTracker Sponsors Premier Cybersecurity Conference for Bermudian Technology Leaders

‘Secure Bermuda 2016’ Empowering Professionals to Build Strong Cybersecurity Strategies COLUMBIA, MD– Jul 12, 2016 – EventTracker, a leading provider of comprehensive and remote managed SIEM solutions, today announced that … Continue reading

See All

White Papers

WhitePapers

Architecture Series
Change Management Series
Compliance Series
Enterprise Series

continue...

 

5 Indicators of Endpoint Evil

With so much focus on security these days, it’s easy to imagine that IT departments are winning the battle against malware and other threats. But all too often, a lack of focus on certain areas of the network may actually lead to a decrease in an organization’s security posture, and an increase in risk. (more…)

See All

Newsletters

Newsletters

What is privilege escalation and why should you care?

By David Strom A common hacking method is to steal information by first gaining lower-level access to your network. This can happen in a variety of ways: through a print … Continue reading

See All

Latest Videos

Latest Videos

Shellshock, Windows & EventTracker
Energy Sector: Highly Valuable & Highly Vulnerable
Selecting a SIEM - Tips & Trend 2014
Configuration Assessment

continue...

Knowledge Center

Knowledge Center

EventTracker uses Knowledge Packs to assign meaning and severity to incoming data. This allows users to "make sense" of the often cryptic, high volume log messages. A Knowledge Pack may include definitions for Alerts, Reports, Dashboards, Smart Search Tokens, Behavior and Correlation rules, which are used in various EventTracker modules.
Learn more

Compliance Center

Compliance Center

EventTracker's solutions helps to automate the steps required by each standard to insure compliance, and maintain it going forward. With EventTracker, organizations can secure the environment, establish the baseline, track user activity, alert on potential violations, and generate audit ready reports.
Learn more

Log Knowledge Base

Knowledge Base

The EventTracker Knowledgebase is the largest searchable repository for detailed information about event logs generated by Windows/*nix/Cisco (syslog), Antivirus, Veritas, OpenManage, VMWARE, and more. The KB is a free service provided by Prism Microsystems.
Learn more

See All

Webcasts & Archived Webinars

Webinars

Industry Trends
Compliance
Driving Business ROI

continue...