Whitepapers

A Dollar of Prevention is Worth a Bitcoin of Cure

A Dollar of Prevention is Worth a Bitcoin of Cure

A true story of how one organization was impacted by a data breach. This executive brief shares the true story of an...

Zero to SOC

Zero to SOC

Every business–no matter its size–is a bullseye for cyber criminals. Data breaches cost an average of $3.6 million...

Choosing the Right SIEM

Choosing the Right SIEM

While there is little doubt that SIEM solutions are critical for compliance, security monitoring or IT optimization...

5 Indicators of Endpoint Evil

5 Indicators of Endpoint Evil

With so much focus on security these days, it’s easy to imagine that IT departments are winning the battle against...

Co-sourcing SIEM

Co-sourcing SIEM

When outsourcing isn’t an option but SIEM proficiency is beyond the internal staff ’s expertise, a hybrid approach...

EventTracker Threat Intelligence Integration

EventTracker Threat Intelligence Integration

Safeguarding the IT environment has become an increasingly difficult challenge as cyber attackers have become more...

Using Windows Event Collector

Using Windows Event Collector

This document provides guidance on configuring Windows 2008 Server or Windows 7 or higher systems to forward selected...

Spotting the Adversary with Windows Event Log Monitoring

Spotting the Adversary with Windows Event Log Monitoring

An introduction to collecting important Windows workstation event logs and storing them in a central location for...

SIEM Simplified Answering 4 W’s

SIEM Simplified Answering 4 W’s

To support security, compliance and operational requirements, specific and fast answers to the 4 W questions (Who...

Agent and Agentless Monitoring with EventTracker

Agent and Agentless Monitoring with EventTracker

EventTracker supports both agent and agentless collection of logs. This paper helps readers understand agents and...

Monitoring Mobile Devices with ActiveSync Using EventTracker

Monitoring Mobile Devices with ActiveSync Using EventTracker

Exchange ActiveSync enables mobile phone users to access their e-mail, calendar, contacts, and tasks allowing them to...

Helping Meet FISMA Compliance With EventTracker

Helping Meet FISMA Compliance With EventTracker

The Federal Information Security Management Act of 2002 (FISMA) was passed with the purpose of improving computer and...

Meeting HIPAA Compliance with EventTracker

Meeting HIPAA Compliance with EventTracker

There are a number of steps a healthcare provider must undertake to meet the Technical Safeguards mandated in the...

Meeting NISPOM Compliance with EventTracker

Meeting NISPOM Compliance with EventTracker

The National Industrial Security Program Operating Manual (NISPOM) was developed by the Department of Defense to set...

Meeting the Payment Card Industry Data Security Standard

Meeting the Payment Card Industry Data Security Standard

The Payment Card Industry Data Security Standard mandates requirements to protect card holder data. Requirements...

Leveraging Log Management to provide business value

Leveraging Log Management to provide business value

Despite the obvious benefits of Log Management and its increasing recognition as a critical necessity by the IT...

Managing The Virtualized Enterprise: New Technology, New Challenges

Managing The Virtualized Enterprise: New Technology, New Challenges

The benefits of employing virtualization in the corporate data center are compelling — lower operatingcosts, better...

Top Ten Insider Threats and How to Prevent Them

Top Ten Insider Threats and How to Prevent Them

With companies making painful personnel and compensation choices in this poor economy, one of the impacts has been an...

EventTracker Architecture: Managing Billions of Logs Every Day

EventTracker Architecture: Managing Billions of Logs Every Day

This paper highlights the major advantages of employing EventTracker to consolidate, correlate, and manage event log...

Security Beyond the Windows Event Log — Monitoring Ten Critical Conditions

Security Beyond the Windows Event Log — Monitoring Ten Critical Conditions

This technical white paper describes the ten most critical security conditions that are not monitored by the Windows...

Understanding Change Management

Understanding Change Management

The purpose of this document is to help users to understand the concept of Change Monitoring and to introduce the...

Why EventTracker is the best choice for Security Information and Event Management

Why EventTracker is the best choice for Security Information and Event Management

Offers a brief overview of the top 8 reasons EventTracker should be your security information and event management...

Managing USB Mass Storage Devices — Best Practices

Managing USB Mass Storage Devices — Best Practices

This White Paper discusses how you can take advantage of the power of high capacity USB storage devices like thumb...

Have your cake and eat it too

Have your cake and eat it too

Implementing a complete SIEM solution is a smart move when budgets are tight and resources are limited. Learn how you...

Fifty Critical Alerts for Monitoring Windows Servers

Fifty Critical Alerts for Monitoring Windows Servers

This whitepaper discusses the most important events generated by your Windows servers and demonstrates how strategic...

Five Code RED Security Threats to Windows Servers — How to Detect Them

Five Code RED Security Threats to Windows Servers — How to Detect Them

The purpose of this white paper is to identify and demonstrate how to detect five of the most significant security...

Monitoring Windows Workstations Seven Important Events

Monitoring Windows Workstations Seven Important Events

Monitoring event logs from workstations provides two important benefits a) it saves money by adopting a proactive...

Monitoring Exchange Server Using EventTracker

Monitoring Exchange Server Using EventTracker

With EventTracker you can monitor all of your servers running Microsoft Exchange from a single view. Through alerts...

Return on Investment (ROI) calculator

Return on Investment (ROI) calculator

Organizations are looking to reduce costs around device management by reducing the number of dedicated employees...

Monitoring SharePoint Server Using EventTracker

Monitoring SharePoint Server Using EventTracker

With EventTracker you can monitor all of your servers running SharePoint from a single view. Through alerts...

See EventTracker in action!

See EventTracker in action!

Join our next live demo October 1st at 2:00 p.m. EST.

Register Here