Operations | Monitoring | ITSM | DevOps | Cloud

November 2020

Vabi gains total visibility into its network using OpManager and Firewall Analyzer

Vabi is a Netherlands-based company that provides “real estate data in order, for everyone.” Since 1972, the company has focused on making software that calculates the performance of buildings. Nine out of 10 utility buildings in the country have been simulated with Vabi’s sustainable model. Vabi has widened its scope from making calculations for construction and installation technology to making building data accessible to everyone.

Masterclass: Advanced series session 2 - Build a high velocity incident response tool chain

In this session of the advanced masterclass series, you'll learn how to link ServiceDesk Plus to the ManageEngine operations tool chain and how to operate an analytics-driven service desk. You'll also learn about features that will help you separate management and bureaucracy, enabling you to accelerate your service desk operations.

Masterclass: Advanced series Session 2 - Hack your service desk for the new normal (Cloud)

In this session of the advanced masterclass series, you will discover ways to adapt your service desks to the current crisis and learn how integrations with Microsoft Teams, Jira and Slack work in the cloud version of ServiceDesk Plus.

Masterclass: Advanced series Session 1 - Hack your ServiceDesk Plus for the new normal

Learn a few advanced features of ServiceDesk Plus that enable you to create a virtual office experience for your requesters and technicians. Masterclass+ is a webinar series focussed on training ServiceDesk Plus administrators on advanced features, configurations, and integrations.  

SupportCenter Plus 11.0 demo: The help desk software for world-class customer support

The all-new #SupportCenterPlus 11.0 brings a brand-new UI, some exciting new features and functionalities that's sure to take your #customersupport several notches higher and provide unparalleled customer experience. In this webinar, we'll be doing a product walk-through while discussing all the key features along with it. Account and contact management: Deliver personalized services with a multi-tenant architecture for managing accounts and contacts.

Setting up a service catalog for your remote workforce with ServiceDesk Plus

In this video, we will be looking at how organizations can streamline employee onboarding with the various features available in the ServiceDesk Plus' arsenal. We'll be looking at a use case where a company is trying to onboard employees in a short time, and build a service catalog outlining the services available to users. Leveraging ServiceDesk Plus' automations, templates, request life cycles, and approvals, the company was able to accelerate employee onboarding and build a process that is easy to monitor and manage.

Solve storage monitoring woes with OpManager

Data in your enterprise organization doubles almost every year, and data multiplication at this pace requires boosting your storage capacity. But when the magnitude of data size increases, latency or performance lags are inevitable. You can outsource your storage infrastructure management to a third-party, but this might place your data at risk from security threats. The correct approach is to install a dedicated storage monitoring solution in your network. Fair enough! But is it essential?

IT security under attack blog series: Instant domain persistence by registering a rogue domain controller

In this blog in the IT security under attack series, we will learn about an advanced Active Directory (AD) domain controller (DC) attack to obtain persistence in AD environments. Dubbed DCShadow, this is a late-stage kill chain attack that allows a threat actor with admin (domain or enterprise admin) credentials to leverage the replication mechanism in AD to register a rogue domain controller in order to inject backdoor changes to an AD domain.

The Building Company: "Building" the future with OpManager

The Building Company serves the full spectrum of the construction industry including the residential, commercial, and industrial markets. The retail activities of the company are provided through 124 outlets throughout Southern Africa. Operations are located in major centers in South Africa, Namibia, Botswana, and Swaziland, and are managed as either corporate, joint venture, or franchise stores.

6 ways to use analytics to deliver an exceptional end-user experience: Part 2

Welcome to the second part of our three-part blog series on leveraging analytics to deliver an exceptional end-user experience. In the last part, we discussed two key points: how to gauge the effectiveness of your support forms using analytics, and how to pick the right metrics that focus on customer satisfaction. In this part, we’ll discuss the next two ways analytics can help you deliver an exceptional end-user experience.

Five worthy reads: The rise in credential stuffing attacks

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week we explore how credential stuffing attacks are evolving and why they pose a greater threat than meets the eye. Credential stuffing is perhaps the simplest form of cyberattack, but it continues to make headlines despite its lack of sophistication. It has become the attack method of choice for cybercriminals primarily because of its high success rate and ROI.

5 user behavioral patterns to look out for in a decentralized workspace

Problem: If there are thousands of employees scattered around hundreds of places, how do you keep your organization’s network safe? Solution: You should monitor your employees wherever they’re located, and devise a standard baseline of their behavior through machine learning techniques. By using that information, you can identify anomalies and protect your network from cyberattacks.

Why every IT admin needs a hardware monitor, and what it can do for your organization's business continuity

The ITIC 2020 Global Server Hardware, Server OS Reliability Report released in April found that reliability declined in 67 percent of servers over four years old when corporations failed to retrofit or upgrade the hardware to accommodate increased workloads. This highlights the pressing need for hardware monitor solutions and the need for immediate alerting mechanisms to ensure the longest possible lifespan for hardware.

ManageEngine Insights - Building resilience with cloud transformation

Amidst the complexity of today's dynamic market landscape, the cloud has emerged as a reliable technology whose benefits are far-reaching and long-lasting. Despite COVID-19 affecting global IT spending, companies have continued to invest in cloud solutions. Be it making the business more agile or accelerating their digital transformation goals, companies are turning to the cloud for a variety of reasons.

5 key benefits of using an IP scanner

In todays IP-centric world, it’s becoming increasingly complex to support network-intensive adaptations like cloud adoption and bring your own device (BYOD) polices. As an IT admin, you’re responsible for scanning and tracking your IP resources to ensure that network devices and end users can be allocated unique IP addresses to access your network.

6 ways to use analytics to deliver an exceptional end-user experience: Part 1

The rules of customer engagement have changed drastically in the last decade, not only for direct customer-facing roles but also for internal customer-facing roles such as technical service team staff, NOC admins, and more. Organizations across the globe are now fully aware that great customer service from support teams and NOC teams can have a lasting impact on employee productivity, morale, and in turn, the organization’s overall revenue churn and growth.

Fast-track bulk Microsoft 365 object creation with M365 Manager Plus

User account creation is a long-winded process that involves various configurations. Such a tiresome, manual process is naturally prone to errors, especially while creating user accounts in bulk. Errors made in the user provisioning process will result in frustrated users calling the service desk to request permission to access resources, to be added to the appropriate groups, to update missing profile details, etc. Why provisioning users through the Admin Center is inefficient.

ManageEngine recognized as a 2020 Gartner Peer Insights Customers' Choice for Application Performance Monitoring

The mission for the ManageEngine Applications Manager team has always been simple: to provide a unified solution that helps organizations deliver a seamless end-user experience. Application performance significantly impacts operations. Tracking every element across your application stack, finding and fixing problematic components, and ensuring a flawless digital experience is crucial for seamless performance.

CybersecAsia Awards 2020 recognizes ManageEngine for its leadership in cybersecurity

ManageEngine’s Log360 was recently honored with the CybersecAsia Award for the Best User and Entity Behavior Analytics software application. The award certifies the important role, and the innovative technology brought to the table by Log360 over the past two years. Elevated cybersecurity risks currently experienced by organizations have driven the sudden adoption of the cloud and increased workforce mobility.

OpManager helps UK food retailer troubleshoot network issues faster

A.F. Blakemore & Son Ltd is a renowned food retail and distribution company based in the United Kingdom. It is also a member of the Unitas Wholesale group and a significant supplier to the independent grocery sector across the UK. How OpManager helped A.F. Blakemore A.F. Blakemore has two internal data centers that process and manage logistics, retail, and distribution data. However, it did not have a separate tool for monitoring its network, which created problems.

Five Worthy Reads: Has the pandemic accelerated digital transformation?

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week we explore how the pandemic and the rise of the remote work culture have enabled digital transformation.

Port scanner 101: What it is and why should you use it

In today’s complex network infrastructure comprised of diverse resources, devices, and users, port scans represent a significant amount of network traffic. Crackers and hackers alike use port scanners to discover port vulnerabilities that can become attack vectors to malicious outcomes. In this post, we discuss the fundamentals of port scanning, and why you need to deploy an effective port scanner software on your network right now.

Sponsored Post

ManageEngine IT Ops Management Seminar 2020

ManageEngine is conducting a virtual seminar this November, on how your employees can overcome IT Ops management issues in a dual workforce environment. Attend the seminar to identify, address and solve IT Ops management issues, when your workforce is scattered across office and remote locations.

An 8-point checklist to get Cisco management right

Cisco, one of the first companies to debut in the networking space, has given rise to radical and revolutionary technologies, inventions, and innovations that have helped set the stage for modern-day networking. Contemporary networks house an abundance of Cisco network components and employ manifold Cisco network technologies, making Cisco an integral part of their core network infrastructure.

Alert AA20-302A: Federal agencies warn about ransomware attacks targeting hospitals

A cybersecurity bulletin was released by the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Department of Health and Human Services (HHS) on October 28, 2020. The three agencies have issued a high-level warning about an increased, imminent threat of ransomware attacks in the healthcare sector. The cybercriminal group behind the TrickBot, Ryuk, and BazarLoader malware is now targeting U.S. hospitals and healthcare providers.

Tackling your network security challenges using ManageEngine ITOM solutions

Network security management typically entails end-to-end management of the entire network security infrastructure of an enterprise. However, in this rapidly changing security ecosystem, there’s an inherent need for IT admins to be extremely agile to maintain an effective security posture.