Resources

See All

Blog

Blog

Detect Persistent Threats on a Budget

There’s a wealth of intelligence available in your DNS logs that can help you detect persistent threats. So how can you use them to see if your network has been … Continue reading

See All

Media Coverage

MediaCoverage

Meeting Ransomware Threats with SIEM

LegalTech News It used to be that security technologies comprised a preventative toolset including firewall, antivirus, web and email gateways. There was a clear distinction between “do-it-yourself” security approaches and … Continue reading

See All

Case Studies

In this case study, see how a member-owned electric distribution cooperative used EventTracker Security Center, paired with EventTracker’s co-managed service, SIEM Simplified, to meet PCI-DSS standards and maintain IT security. … Continue reading

A case study written by The 451 Group  shows how EventTracker’s SIEM Simplified service simplifies for labor union. EventTracker Simplifies SIEM for Labor Union was last modified: March 16th, 2016 … Continue reading

See All

Press Releases

Press Releases

EventTracker Sponsors Premier Cybersecurity Conference for Bermudian Technology Leaders

‘Secure Bermuda 2016’ Empowering Professionals to Build Strong Cybersecurity Strategies COLUMBIA, MD– Jul 12, 2016 – EventTracker, a leading provider of comprehensive and remote managed SIEM solutions, today announced that … Continue reading

See All

White Papers

WhitePapers

Architecture Series
Change Management Series
Compliance Series
Enterprise Series

continue...

 

5 Indicators of Endpoint Evil

With so much focus on security these days, it’s easy to imagine that IT departments are winning the battle against malware and other threats. But all too often, a lack of focus on certain areas of the network may actually lead to a decrease in an organization’s security posture, and an increase in risk. (more…)

See All

Newsletters

Newsletters

Should I be doing EDR? Why isn’t anti-virus enough anymore?

By: David Strom Detecting virus signatures is so last year. Creating a virus with a unique signature or hash is quite literally child’s play, and most anti-virus products catch just … Continue reading

See All

Latest Videos

Latest Videos

Shellshock, Windows & EventTracker
Energy Sector: Highly Valuable & Highly Vulnerable
Selecting a SIEM - Tips & Trend 2014
Configuration Assessment

continue...

Knowledge Center

Knowledge Center

EventTracker uses Knowledge Packs to assign meaning and severity to incoming data. This allows users to "make sense" of the often cryptic, high volume log messages. A Knowledge Pack may include definitions for Alerts, Reports, Dashboards, Smart Search Tokens, Behavior and Correlation rules, which are used in various EventTracker modules.
Learn more

Compliance Center

Compliance Center

EventTracker's solutions helps to automate the steps required by each standard to insure compliance, and maintain it going forward. With EventTracker, organizations can secure the environment, establish the baseline, track user activity, alert on potential violations, and generate audit ready reports.
Learn more

Log Knowledge Base

Knowledge Base

The EventTracker Knowledgebase is the largest searchable repository for detailed information about event logs generated by Windows/*nix/Cisco (syslog), Antivirus, Veritas, OpenManage, VMWARE, and more. The KB is a free service provided by Prism Microsystems.
Learn more

See All

Webcasts & Archived Webinars

Webinars

Industry Trends
Compliance
Driving Business ROI

continue...