September 21, 2015
EventTracker Now Monitors and Reports on the Most Universally Known Office Software
COLUMBIA, MD–(Marketwired) – EventTracker, a leading provider of comprehensive SIEM solutions, announced today the general availability of the newest version of its Knowledge Packs in support of Microsoft Office 365.
EventTracker Knowledge Packs prioritize and assign meaning to incoming data, allowing users to make sense of high volume log messages. The Office 365 Knowledge Pack includes definitions for alerts, reports and dashboards. Administrators can easily audit compliance with organizational policies to proactively identify security risks, unused licenses, and analyze how Office 365 services are being used over the long term. EventTracker retrieves and analyzes generated logs to identify spammers, trace messages, as well as monitor license usage, user behavior, administrative activity, and mailbox activity.
- Gain insight and analytics into how people in the organization are using Office 365 services
- Identify security risks and cost savings
- Maintain visibility of changes in your environment
“EventTracker is Microsoft Gold ISV competent; we are in the top 1 percent of Microsoft’s partner ecosystem, and we are pleased to now provide a Knowledge Pack in support of Office 365,” said A.N. Ananth, CEO, EventTracker. “Office 365 is now available for the user across all devices, wherever they go. In this day and age of the regularly occurring data breach, it is critical to provide monitoring and with that, peace of mind. We at EventTracker are happy to provide the monitoring and reporting of our esteemed partner’s offering.”
EventTracker delivers business critical solutions that transform high-volume cryptic log data into actionable, prioritized intelligence that will fundamentally change your perception of the utility, value and organizational potential inherent in log files. EventTracker’s leading solutions offer Security Information and Event Management (SIEM), real-time Log Management, and powerful Change and Configuration Management to optimize IT operations, detect and deter costly security breaches, and comply with multiple regulatory mandates.