Artificial IntelligenceCybersecurityMENA Tech SceneNewswireTechnology

ManageEngine Reduces SOC Alert Fatigue with Reengineered Detection

▼ Summary

– Log360 has been upgraded with a reengineered threat detection approach to reduce false positives and help security teams prioritize high-value alerts.
– The solution includes over 1,500 prebuilt, cloud-delivered detection rules mapped to the MITRE ATT&CK framework and SIGMA for broad threat coverage.
– Enhancements support enterprise scalability through multi-tier architecture, role-specialized log processing, and centralized multi-site collection.
– Beta testing by ECSO 911 showed a 90% reduction in false or low-priority alerts and faster detection-to-response cycles.
– A centralized detection console allows security teams to create and tune rules without complex queries, improving efficiency and analyst focus.

Security operations centers face a relentless flood of alerts, with many teams struggling to separate critical threats from distracting noise. ManageEngine’s Log360 introduces a reengineered detection system designed to tackle this very challenge, offering SOC analysts a smarter way to prioritize and respond to genuine risks. The platform’s latest enhancements focus on reducing false positives, improving threat coverage, and supporting enterprise-level scaling, all while keeping pace with evolving cyber threats.

According to a recent industry study, more than 60% of SOC professionals report feeling overwhelmed by irrelevant data, and over half of cloud security alerts are considered meaningless noise. Log360’s upgraded architecture directly confronts this issue by integrating a centralized detection console, granular object-level filters, and over 1,500 prebuilt detection rules aligned with the MITRE ATT&CK framework. These cloud-delivered rules are continuously updated, ensuring that security teams always have access to the latest threat intelligence without manual intervention.

Manikandan Thangaraj, Vice President at ManageEngine, emphasized the shift in focus from data collection to intelligent signal discrimination. “The real challenge isn’t having more data, it’s making sense of it. Our reengineered system allows analysts to suppress benign activity without missing actual compromises, turning constant monitoring into targeted threat hunting.”

Early adoption by organizations like Emergency Communications of Southern Oregon (ECSO) 911 has demonstrated tangible benefits. The agency, which handles emergency dispatch for Jackson County and Crater Lake National Park, reported a 90% reduction in false or low-priority alerts after implementing Log360’s updated detection capabilities. According to IT Manager Corey Nelson, “For a 911 center, security isn’t optional. These improvements have dramatically accelerated our response to real incidents.”

Key features of the upgrade include a unified detection interface that brings together correlation rules, UEBA insights, and threat intelligence into a single view. Analysts can create and fine-tune detection logic through an intuitive interface, no complex query language required. Object-level filtering allows teams to monitor high-value assets like specific Active Directory users or groups while automatically suppressing noise from less critical sources.

The system also incorporates SIGMA-based detection rules and supports a multi-tier architecture for large-scale deployments. This ensures that even organizations with distributed, high-volume log sources can maintain performance and reliability as they grow.

Log360 remains a comprehensive SIEM solution with integrated DLP and CASB functionalities, providing visibility across on-premises, cloud, and hybrid environments. Its Vigil IQ module combines machine learning, rule-based detection, and an incident workbench to help teams investigate and remediate threats efficiently.

For those interested in learning more, a launch session is scheduled for September 30, 2025.

(Source: MEA Tech Watch)

Topics

threat detection 95% False Positives 90% rule tuning 88% soc efficiency 87% log management 86% mitre att&ck 85% unified console 84% enterprise scalability 83% incident response 82% cloud delivery 82%