Operations | Monitoring | ITSM | DevOps | Cloud

Why VPNs on mobile devices are a crucial part of securing access to corporate data

Securing access to business resources has always been of high priority for admins and IT teams. In the wake of the pandemic, workforces are more distributed than ever before, and 76 percent of global office workers state that they would like to work from home even when the pandemic is over.

Five worthy reads: Hyperscale: The path ahead for data centers and organizations

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. In this edition, we’ll learn about hyperscale data centers, including how they function, and the considerations and challenges organization face in deploying them.

Adopting a BYOD policy amid the COVID-19 era

In the midst of the COVID-19 pandemic, even companies that had said no to BYOD have come to terms with it, as a fair share of remote work would not even be possible without such a policy. Pandemic or no pandemic, on-the-go data access has always enabled employees to get work done quickly and efficiently. It guarantees better communication with colleagues, improves customer service, and device familiarity brings employee satisfaction and increased productivity.

How to secure your network from a Ryuk ransomware attack

Universal Health Services (UHS), a Fortune 500 company and healthcare services provider, has reportedly shut down systems at facilities throughout the United States after the Ryuk ransomware hit its network on September 27, according to an article on the Health IT Security website. What is Ryuk ransomware? Ryuk is a sophisticated ransomware threat that targets businesses, hospitals, and government institutions across the world.

Vabi gains total visibility into its network using OpManager and Firewall Analyzer

Vabi is a Netherlands-based company that provides “real estate data in order, for everyone.” Since 1972, the company has focused on making software that calculates the performance of buildings. Nine out of 10 utility buildings in the country have been simulated with Vabi’s sustainable model. Vabi has widened its scope from making calculations for construction and installation technology to making building data accessible to everyone.

Solve storage monitoring woes with OpManager

Data in your enterprise organization doubles almost every year, and data multiplication at this pace requires boosting your storage capacity. But when the magnitude of data size increases, latency or performance lags are inevitable. You can outsource your storage infrastructure management to a third-party, but this might place your data at risk from security threats. The correct approach is to install a dedicated storage monitoring solution in your network. Fair enough! But is it essential?

IT security under attack blog series: Instant domain persistence by registering a rogue domain controller

In this blog in the IT security under attack series, we will learn about an advanced Active Directory (AD) domain controller (DC) attack to obtain persistence in AD environments. Dubbed DCShadow, this is a late-stage kill chain attack that allows a threat actor with admin (domain or enterprise admin) credentials to leverage the replication mechanism in AD to register a rogue domain controller in order to inject backdoor changes to an AD domain.

The Building Company: "Building" the future with OpManager

The Building Company serves the full spectrum of the construction industry including the residential, commercial, and industrial markets. The retail activities of the company are provided through 124 outlets throughout Southern Africa. Operations are located in major centers in South Africa, Namibia, Botswana, and Swaziland, and are managed as either corporate, joint venture, or franchise stores.

6 ways to use analytics to deliver an exceptional end-user experience: Part 2

Welcome to the second part of our three-part blog series on leveraging analytics to deliver an exceptional end-user experience. In the last part, we discussed two key points: how to gauge the effectiveness of your support forms using analytics, and how to pick the right metrics that focus on customer satisfaction. In this part, we’ll discuss the next two ways analytics can help you deliver an exceptional end-user experience.

Five worthy reads: The rise in credential stuffing attacks

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week we explore how credential stuffing attacks are evolving and why they pose a greater threat than meets the eye. Credential stuffing is perhaps the simplest form of cyberattack, but it continues to make headlines despite its lack of sophistication. It has become the attack method of choice for cybercriminals primarily because of its high success rate and ROI.