Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Sponsored Post

Introducing the ITOM podcast: Listen and learn how to avoid remote work roadblocks in an IT environment

In administrating all technology and application requirements within an organization, IT operations management (ITOM) is pretty complex, and tends to send IT admins scrambling for authentic and actionable insights across the internet. We’re taking matters into our own hands and launching our very own podcast series to provide you valuable information on ITOM, which you can choose to listen to at your leisure or on the go!

The LLMNR/NBT-NS strike

Link-Local Multicast Name Resolution (LLMNR) and NetBIOS Name Service (NBT-NS) are two protocols that are used to identify a host address on a network when the DNS name resolution, which is the conventional method, fails to do so. When a DNS server is unable to resolve a request from a requester machine, the latter broadcasts a message to its peer computers asking for the location of the required server. Hackers leverage this operation to steal the credentials of the requester machine.

ManageEngine named a 2020 Gartner Peer Insights Customers' Choice for Security Information and Event Management!

We’re excited to announce that ManageEngine has been recognized as a Customers’ Choice in 2020 Gartner Peer Insights “Voice of the Customer’: Security Information and Event Management (SIEM) for the second time. This is in addition to our recognition in Gartner’s Magic Quadrant for Security Information and Event Management, 2020 for four consecutive times. We are thrilled to be named this recognition yet again. What better way to be recognized than by our customers?

How to protect your IT infrastructure from a Maze ransomware attack

Pitney Bowes, a global package delivery giant, has been hit by a second ransomware attack in less than seven months, according to ZDNet. Those responsible for the attack have released screenshots portraying directory listings from inside the company’s network. What is Maze ransomware and what makes it so special?

Launching Desktop Central Cloud: Embrace UEM the SaaS way!

Desktop Central is a holistic unified endpoint management (UEM) solution that offers a dynamic approach to securing and managing user devices, including desktops, laptops, smartphones, and tablets. Already established as a leader in the UEM field, ManageEngine adds another feather to its cap by now offering a cloud-based UEM solution. Desktop Central Cloud gives you 360-degree control over all your network endpoints.

OpManager now supports SMSEagle, Twilio, and Clickatell, so you can get SMS alerts anywhere!

IT admins need to know the status of their IT devices, servers, routers, switches, and firewalls. To meet this need, OpManager has a highly responsive and robust notification and alerting system that sends alerts via email, Slack, and even SMS. Murphy’s law says anything that can go wrong will go wrong, and if you’re in IT, you’re probably familiar with how easily things can go wrong.

Telecommunications giant reveals an Active Directory server breach. What can we learn from it?

We’ve always been vocal about the imminent threat of breaches and propagated the message that irrespective of the size of your business, the industry you’re in, or your geography, you can be subject to a security breach. And unfortunately, history repeats itself often. On May 11, 2020, Nippon Telegraph & Telephone (NTT), a large telecommunications company, revealed that attackers may have stolen data from its internal systems, affecting over 600 customers.

Leverage advanced analytics to secure your endpoint devices

With the new normal adding several more challenges and variables to the security layer, how do you ensure your data is safeguarded without increasing the workload or the headcount of your security team? Using advanced analytics, in tandem with endpoint monitoring applications such as ManageEngine’s Mobile Device Manager Plus and Desktop Central, will help you better visualize and analyze your endpoint data, identify patterns, and establish correlations.

Permissions, access rights, and privileges: Active Directory and Azure Active Directory

Permissions, access controls, user rights, or privileges define what an identity can see or do in an organization. These terms are often used interchangeably based on context, and essentially perform the same function—granting or denying access to the resources in an enterprise.