Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

New design, layout, and features-the all-new UI of ServiceDesk Plus Cloud is here

The all-new UI of ServiceDesk Plus We are excited to launch the all new user interface for ServiceDesk Plus Cloud, the flagship ITSM software from ManageEngine. This latest UI update takes cues from the minimal design language and features restructured layouts that puts the user at the center of every module interaction. The new user experience is based on four dimensions. This redesign comes with multiple new features, as well.

Build a resilient cybersecurity framework by transforming your IT team into a security team

More organizations than ever before have shifted to a hybrid work culture to reduce the impact of COVID-19. This unprecedented change has not only given rise to new security challenges, but has also considerably increased the surface area available for an attack. A blend of personal and corporate endpoints in use, geographical spread of resources, and a sharp spike in the overall number of security threats have further complicated the already labor-intensive security landscape.

Five worthy reads: Every month should be Cybersecurity Awareness Month!

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. Organizations on a global scale observe Cybersecurity Awareness Month to educate and instruct their employees on cybersecurity best practices. This week we highlight some cybersecurity trends that are shaping the industry today.

OpManager MSP: ManageEngine's new MSP focused network monitoring solution

Are you a managed service provider (MSP) who monitors the networks of multiple customers from a central location? ManageEngine launches OpManager MSP, tailored for MSPs with customer-centered network monitoring and seamless management of different customer networks over multiple locations.

Understanding how attackers move inside your organization

Cyberthreats have been coming at us from the left, right, and center. The number of cyberattacks is forever on the rise, and companies need to keep ramping up their security measures to protect themselves. It’s important that these measures cover every aspect of a network environment. To understand why monitoring your whole environment is so important, let’s take a look at what an attacker might do once they get inside your organization.

System extensions are replacing macOS kernel extensions. How will this affect you?

From the outset, Apple has been keen to protect user privacy and security, and deprecating kernel extensions is one of the company’s latest moves towards modernizing its platform. As part of Apple’s sustained effort to make macOS a more reliable and secure platform, the tech giant announced at WWDC 2019 that kernel extensions are going to be replaced in macOS Catalina with Apple’s new technology, system extensions. But, why should you care? Let’s explore now.

Advanced Active Directory attacks: Simulating domain controller behavior

There was a time when cyberattacks on identity and authentication infrastructures [like Active Directory (AD)] were immensely challenging to perform. A lot of forethought had to be put into devising a plan for the careful execution of attacks, and advanced technical knowledge of domains and networks was a requisite. Over time, with the advent of open-source pen testing tools, the knowledge gap and the complexities involved to carry out a full-scale cyberattack have narrowed drastically.

Microsoft Teams and OpManager: The perfect team for your remote IT management game

It seems almost everything is going digital during this pandemic: businesses, education, and medical consultations. This increased digital consumption is squeezing the juice out of the IT infrastructure of many organizations. On top of that, remote work policies are posing serious security issues. At times like these, IT infrastructure monitoring is like a football game for IT admins, except: So how do you navigate all these challenges and score a touchdown?

Five worthy reads: The evolving employee experience

Five worthy reads is a regular column on five noteworthy items we have discovered while researching trending and timeless topics. This week, we explore how the employee experience is evolving with the new normal. The employee experience (EX) isn’t about ping pong tables or bring-your-pet-to-work days anymore. The new normal of working remotely has brought in a paradigm shift in the way businesses and employees operate.

How to ensure a seamless end-user experience: The ITOM Podcast [Episode 6]

The ITOM Podcast is back with an all new episode aimed to alleviate all your remote work woes in your IT environment. In the last episode, we discussed in detail about the need for compliance checks, major causes of compliance violations across industries, and the solution to help maintain network compliance. This week, we’ll dive into the end-user experience in this era of remote work.