Operations | Monitoring | ITSM | DevOps | Cloud

February 2021

Security operations center, Part 2: Life of a SOC analyst

In the first part of this blog series, we saw a brief overview of what a security operations center (SOC) is and how it operates. In this part, we’ll take a look at the typical activities that SOC analysts carry out every day to protect their organization from constantly evolving cyber threats and the skill sets that come in handy in effectively carrying out their duties.

Streamline project management with advanced analytics for Jira Software

Managing projects isn’t an easy task, particularly if you’re managing parallel projects with inter-team dependencies. Lack of visibility coupled with difficulty in obtaining the right metrics on time can make it nearly impossible for project teams to track issues, action items, and risks, often resulting in projects running behind schedule, overshooting budgets, or worse, getting stalled due to unforeseen problems.

Windows network monitoring made easy with OpManager

Network administrators are responsible for the day-to-day operation of computer networks at organizations of any size and scale. Their primary duty is to manage, monitor, and keep a close watch on the network infrastructure to prevent and minimize downtime. Managing a network includes monitoring all the network components, including Windows devices. In any Windows network, the desktops, servers, virtual servers, and virtual machines (VMs), like Hyper-V, run on the Windows operating system.

5 trends that will define endpoint management in 2021 and beyond

2020 was a year of tremendous dejection and disruption. Imagine if you had told your organization’s upper management that they had to switch their 10,000 or 20,000 strong corporate office to the virtual world back in January 2020. They would have flipped. Despite all the fear and loss that 2020 brought, we capitalized on the opportunities. And even a year later, there are still possibilities galore.

Dangerous defaults that put your IT environment at risk: IT security under attack

In this blog in the “IT security under attack” series, we wanted to shed some light on an unfamiliar and seldom discussed topic in IT security: the default, out-of-the-box configurations in IT environments that may be putting your network and users at risk. Default settings, and why the initial configuration is not the most secure.

Cross Company manages IT efficiently using OpManager's push notifications and email alerts

Customer stories are one of the best ways for users to get to know a solution or tool and learn how it can solve their problems. By sharing some of our customers’ OpManager success stories, we aim to help new users and evaluators understand our solution and its wide range of functions. Let’s take a look at how Cross Company used OpManager. Founded in 1954, Cross Company is a 100 percent employee-owned engineering and automation services company.

5 trends that will define endpoint management in 2021 and beyond

2020 was a year of tremendous dejection and disruption. Imagine if you had told your organization’s upper management that they had to switch their 10,000 or 20,000 strong corporate office to the virtual world back in January 2020. They would have flipped. Despite all the fear and loss that 2020 brought, we capitalized on the opportunities. And even a year later, there are still possibilities galore.

Cyberattack on Florida's water treatment plant: What it means to global organizations

The recent news of a cyberattack on a water treatment plant carried out by a remote perpetrator came as a shock to organizations around the world. Earlier this month, an unauthorized threat actor had remotely accessed the plant’s control systems via TeamViewer and used it to increase the amount of sodium hydroxide (lye) in water to dangerously higher levels.

The what, why, and how of using network IP scanners in IP-centric IT infrastructures

A simple command-line interface (CLI) ping will give you details about your target IP address. However, you may have to input the ipconfig command, and then the arp-a command to fully discover the status of an IP, and this is just for one IP address. Now imagine doing this for an IP block of 300 IPs, or even 50 IPs, or doing the same task periodically to manage your IP pool of thousands of addresses and their metrics. Seems like an Herculean task for any network admin!

Abu Dhabi's Khalifa University enables high quality technical education with a little help from OpManager

By sharing some ManageEngine OpManager customer success stories, we aim to help our users understand this integrated network management solution, including it’s powerful functionality. We hope this enables evaluators and users to make informed decisions. Let’s begin with the story. UAE’s Khalifa University offers excellent, world-class education. But exceptionalness does not mean monitoring and maintaining its IT infrastructure comes easy.

Features to check for in a network scanner for enterprise networks

Network scanners have become an integral part of every IT admin’s first line of defense against security breaches. Using the right network scanner tool to conduct effective network reconnaissance and diagnosis enables you to pinpoint network issues that can escalate to security risks and network mishaps. A typical network scanner would allow you to scan a range of IP addresses sequentially, and display the active devices within that address block.