Log360 Resources Library

Learn more about Log360 through our resources.

White papers

Leveraging smart thresholds for accurate detection
Whitepaper
Leveraging smart thresholds for accurate detection

Navigating today's attack landscape demands constant vigilance against emerging threats. However, security teams often find themselves overwhelmed by the sheer volume of alerts generated by SIEM solutions. The static nature of traditional thresholds not only adds to this challenge but can also lead to critical alerts being buried amidst the noise. This is where the concept of smart thresholds emerges as a game-changer.

How to calculate the cost savings from your SIEM implementation.
Whitepaper
How to calculate the cost savings from your SIEM implementation.

Organizations are losing money due to delayed threat detection and response, regulatory fines, and wasted analyst time. This white paper discusses how you can calculate the cost savings from your SIEM implementation, the various capabilities of an effective SIEM solution, and the economic benefits they provide to your organization.

How to streamline user identity mapping (UIM) for better anomaly detection
Whitepaper
How to streamline user identity mapping (UIM) for better anomaly detection

UEBA helps you prioritize risks by using score-based risk assessment depending on the severity of a user's anomaly, but how can you achieve effective risk scoring if employees use different accounts to access different platforms and devices? In this whitepaper, you will learn how Log360 can help you map discrete user accounts easily and achieve comprehensive user risk scoring.

Threat intelligence and the SIEM advantage
Whitepaper
Threat intelligence and the SIEM advantage

Having threat intelligence capabilities is a necessity in any organization. Threat intelligence is crucial in protecting your organization from malicious attacks. This white paper explains what mature threat intelligence capabilities look like, why SIEM solutions are ideal in setting up a threat intelligence system, and also provides useful enterprise use cases.

Using indicators to deal with security attacks
Whitepaper
Using indicators to deal with security attacks

Indicators of compromise (IoCs) and indicators of attack (IoAs) help organizations instantly detect an attack, blueprint an attack sequence, identify an attack before damage is caused, and more. This white paper helps security professionals understand the capabilities of these indicators, the differences between them, and the steps to configure a SIEM solution to detect IoCs and IoAs.

The role of IT in achieving SOX compliance
Whitepaper
The role of IT in achieving SOX compliance

The Sarbanes-Oxley Act (SOX) was issued to protect the interests of shareholders as well as the general public. SOX compliance requires major contributions from the finance and IT departments of an enterprise. This paper concentrates on the IT side of achieving and maintaining SOX compliance.

ISO 27001 - Alert profile recommendations for ManageEngine Log360
Whitepaper
ISO 27001 - Alert profile recommendations for ManageEngine Log360

Improve your organization's security posture and comply with the requirements of ISO 27001 standard using our comprehensive list of alerts that must be configured in a Security Information and Event Management (SIEM) solution. Don't let security incidents go undetected. Secure your organization's information assets today!