Resources

See All

Blog

The Seven Habits of Highly Fraudulent Users

This post [http://blog.siftscience.com/seven-habits-of-highly-fraudulent-users/] from Izzy at SiftScience describes patterns culled from 6 million transactions over a three month sample. The “fraud” sample consisted of transactions confirmed fraudulent by customers; “normal” samples consisted of transactions confirmed by customers to be non-fraudulent, as … Continue reading

See All

Media Coverage

EventTracker 7.6: Digging Into Details for Intrusion Detection

Virtualization Review Finding security problems isn’t easy, with all the information generated by a typical datacenter. It’s worth your time to investigate solutions. A. N. Ananth, CEO of EventTracker, visited to introduce himself and his company, and to discuss the need … Continue reading

See All

Case Studies

A case study written by The 451 Group  shows how EventTracker’s SIEM Simplified service supplements the IT department of a financial organization.

Phreesia provides tablets to doctors offices, uses EventTracker for HIPAA compliance; Mobile Productivity is a leader in automotive repair, uses EventTracker for PCI-DSS compliance.

See All

Press Releases

EventTracker Announces 7.6 with Smart Search

EventTracker Enterprise 7.6 new features simplify the extraction of operational and security intelligence from machine data. COLUMBIA, MD, September 15, 2014 – EventTracker, a leading provider of comprehensive SIEM solutions, announced today the general availability of the newest version of … Continue reading

See All

White Papers

Architecture Series
Change Management Series
Compliance Series
Enterprise Series

continue...

 

Using Windows Event Collector

This document provides guidance on configuring Windows 2008 Server or Windows 7 or higher systems to forward selected events from their event log to another Windows system which acts as the Event Collector. EventTracker can then receive events from the Event Collector and properly distinguish each event.

  1. (required)
  2. (required)
  3. (required)
  4. (required)
  5. (valid email required)
 

cforms contact form by delicious:days

See All

Webcasts & Archived Webinars

Industry Trends
Compliance
Driving Business ROI

continue...
See All

Newsletters

Mobile and Remote Endpoints – Don’t Leave Them Out of Your Monitoring

By: Randy Franklin Smith I’ve always tried to raise awareness about the importance of workstation security logs. Workstation endpoints are a crucial component of security and the first target of today’s bad guys. Look at news reports and you’ll find … Continue reading

EventTracker Updates

See All

Latest Videos

Selecting a SIEM - Tips & Trends 2014
What's New in 7.5
EventTracker Log Manager Webinar
SIEM Simplified Webinar
Top 5 Threatscape 2013

continue...

Knowledge Center

EventTracker uses Knowledge Packs to assign meaning and severity to incoming data. This allows users to "make sense" of the often cryptic, high volume log messages. A Knowledge Pack may include definitions for Alerts, Reports, Dashboards, Smart Search Tokens, Behavior and Correlation rules, which are used in various EventTracker modules.
Learn more

Compliance Center

EventTracker's solutions helps to automate the steps required by each standard to insure compliance, and maintain it going forward. With EventTracker, organizations can secure the environment, establish the baseline, track user activity, alert on potential violations, and generate audit ready reports.
Learn more

Threat Center

A carefully curated collection of the latest threat intelligence from reliable sources formatted for easy import into EventTracker. Sources include FBI InfraGuard, US CERT, Internet Storm Center, dshield.org, abuse.ch, etc.
Learn more

Log Knowledge Base

The EventTracker Knowledgebase is the largest searchable repository for detailed information about event logs generated by Windows/*nix/Cisco (syslog), Antivirus, Veritas, OpenManage, VMWARE, and more. The KB is a free service provided by Prism Microsystems.
Learn more