Operations | Monitoring | ITSM | DevOps | Cloud

September 2020

Understanding how attackers move inside your organization

Cyberthreats have been coming at us from the left, right, and center. The number of cyberattacks is forever on the rise, and companies need to keep ramping up their security measures to protect themselves. It’s important that these measures cover every aspect of a network environment. To understand why monitoring your whole environment is so important, let’s take a look at what an attacker might do once they get inside your organization.

System extensions are replacing macOS kernel extensions. How will this affect you?

From the outset, Apple has been keen to protect user privacy and security, and deprecating kernel extensions is one of the company’s latest moves towards modernizing its platform. As part of Apple’s sustained effort to make macOS a more reliable and secure platform, the tech giant announced at WWDC 2019 that kernel extensions are going to be replaced in macOS Catalina with Apple’s new technology, system extensions. But, why should you care? Let’s explore now.

Advanced Active Directory attacks: Simulating domain controller behavior

There was a time when cyberattacks on identity and authentication infrastructures [like Active Directory (AD)] were immensely challenging to perform. A lot of forethought had to be put into devising a plan for the careful execution of attacks, and advanced technical knowledge of domains and networks was a requisite. Over time, with the advent of open-source pen testing tools, the knowledge gap and the complexities involved to carry out a full-scale cyberattack have narrowed drastically.

Microsoft Teams and OpManager: The perfect team for your remote IT management game

It seems almost everything is going digital during this pandemic: businesses, education, and medical consultations. This increased digital consumption is squeezing the juice out of the IT infrastructure of many organizations. On top of that, remote work policies are posing serious security issues. At times like these, IT infrastructure monitoring is like a football game for IT admins, except: So how do you navigate all these challenges and score a touchdown?

Five worthy reads: The evolving employee experience

Five worthy reads is a regular column on five noteworthy items we have discovered while researching trending and timeless topics. This week, we explore how the employee experience is evolving with the new normal. The employee experience (EX) isn’t about ping pong tables or bring-your-pet-to-work days anymore. The new normal of working remotely has brought in a paradigm shift in the way businesses and employees operate.

How to ensure a seamless end-user experience: The ITOM Podcast [Episode 6]

The ITOM Podcast is back with an all new episode aimed to alleviate all your remote work woes in your IT environment. In the last episode, we discussed in detail about the need for compliance checks, major causes of compliance violations across industries, and the solution to help maintain network compliance. This week, we’ll dive into the end-user experience in this era of remote work.

Leveraging behavior analytics and machine learning algorithms in your PAM strategy

Modern technologies like machine learning (ML) algorithms can introduce a forward-thinking outlook to privileged access management (PAM) and enable enterprises to predict emerging access risks in real time. ML-based anomaly detection systems can deeply analyze raw data collected around privileged activity, profile standard user behavior patterns, and then surveil future operations to detect any deviations from the norm, such as server logins after office hours.

How to monitor IIS effectively

Microsoft Internet Information Services (IIS) is a popular web server for hosting web applications and is widely used in many sectors, such as healthcare, banking, e-commerce, logistics, etc. The IIS web server is the backbone of many IT infrastructures. But if the IIS web server encounters problems, it can lead to websites and applications experiencing higher response times, and timeouts resulting in end-users either leaving your website or complaining about the performance.

How to ensure network compliance in this era of remote work: The ITOM Podcast [Episode 5]

The ITOM Podcast returns with yet another episode to help you eliminate all the remote work woes in your IT environment. In the last episode, we discussed in detail about the key areas enterprises need to monitor to ensure endpoint security, measures to adopt to ensure cybersecurity while rolling out BYOD policies, and the crucial factors that IT leaders need to know about in the post-pandemic era with respect to IT security.

Transform the way you manage IT operations with the right network monitoring solution

Business-critical operations rely heavily on network performance. This means there’s a ton of pressure on IT teams to monitor the network effectively. There are numerous aspects to network monitoring, including virtual server monitoring, automation, baseline violation alerting, event logging, availability monitoring, and health monitoring.

How to defend your IT assets while implementing BYOD policies: The ITOM Podcast [Episode 4]

Gear up! The ITOM Podcast is back with an all new episode intended to help you surmount all your remote work challenges in an IT environment. In the last episode, we discussed VPN monitoring in detail, the challenges encountered while monitoring VPNs, and the key metrics to track to overcome those challenges. This week, we will deep dive into endpoint security and BYOD policies.

Best practices for your cloud monitoring strategy

With the advent of cloud technologies, there has been a major shift in the way organizations handle infrastructure operations and service delivery. The increasing shift towards cloud-based and hybrid cloud ecosystems for business operations has made it necessary for organizations to employ cloud monitoring tools that monitor the performance and efficiency of these cloud-hosted services.

4 ways to save on IT costs in the asset life cycle [Part 4: Retirement and disposal]

Welcome back to the final part of our four-part blog series on saving on IT costs in the asset life cycle. In the last part, we talked about how to cut costs during maintenance and support. In this part, we’ll look at retirement and disposal, and ways to save during this phase. The retirement phase of the asset life-cycle can be tricky, because asset managers have to accurately judge the time frame for when a certain asset is ready for retirement.