Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Five worthy reads: Threat intelligence-the key to proactive cybersecurity

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we explore how cyber threat intelligence can aid organizations. Enterprises often end up spending a great deal of money on monitoring and wiring their perimeter with defensive security solutions. But is merely incorporating security solutions like firewalls, antivirus software, intrusion detection systems, web filtering, and encryption enough?

ServiceDesk Plus named in Capterra's 20 most popular IT asset management solutions list

ServiceDesk Plus’ latest recognition comes from Gartner’s Capterra, which has awarded ServiceDesk Plus a position in its Top 20 IT Asset Management Software report. This recognition affirms ServiceDesk Plus’ commitment to providing all that a business needs as a full-fledged IT service desk tool with a robust built-in IT asset management (ITAM) module.

Dealing with three pathbreaking scenarios under the CCPA

“I’d like to pay with my credit card.” “Sure! Let me have your card. Could I also get your full name, phone number, and address?” “Yeah. It’s Logan Lovato, and I live at 1 Lemon Street, Anaheim. My number is 714.308.75xx.” This was a common occurence at retail stores across the US in the not too distant past. People shared their information and didn’t think much about it.

Five reasons to choose Log360, part 5: Integrated compliance management

So far in this blog series, we’ve seen how Log360 is simple to get up and running, allows you to receive a central view of multiple environments, provides deep auditing capabilities across these environments, and comes with advanced security features to deal with all manner of security incidents. In the concluding post of this blog series, we’ll look at another highly essential component of SIEM solutions: integrated compliance management.

Five worthy reads: Is your enterprise dealing with data sprawl properly?

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we define what data sprawl is and how organizations can cope with it effectively. Data sprawl—defined as the proliferation of data into endpoints, servers, applications, BYODs, operating systems, network environments, and even other geo-servers—can be a challenge to monitor and control.

Exciting news about ServiceDesk Plus' IT asset management module

We’re delighted to announce that ServiceDesk Plus, our flagship IT service management (ITSM) solution, received PinkVERIFY 2011 certification for its IT asset management (ITAM) processes. This adds to ServiceDesk Plus’ existing PinkVERIFY certifications for its incident management, request fulfillment, and change management processes.

OpManager bags gold-listed in Feedspot's top networking blogs and sites to follow in 2019

Great news! The OpManager blog has ranked #15 in Feedspot’s top 100 networking blogs and websites to follow. This is a particularly big deal for ManageEngine as we focus on creating valuable content for IT admins, and to be recognized for that confirms we’re headed in the right direction.

Agent Smith materializes from the matrix of Android malware

There’s a new shapeshifting strain of Android malware in the mix. It replaces legitimate apps with compromised ones and is imaginatively named Agent Smith after the iconic villain in The Matrix. Yet another malware attack targeting Android—so what’s the big deal? Agent Smith is similar to other malware campaigns such as Gooligan, HummingBad, and CopyCat with respect to the destruction it can cause via fraudulent ads.

Five reasons to choose Log360, part 3: Comprehensive network auditing

In the previous post, we discussed the various environments that Log360 helps you audit and secure. Having established the ease of Log360’s use and the breadth of its auditing scope, now we’ll examine some of the critical areas it can help you monitor. With over 1,000 predefined reports and alerts for several crucial types of network activity, Log360 provides comprehensive network auditing.

Five worthy reads: Educating the education sector on cybersecurity

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we discuss the state of cybersecurity in the education sector. Making up more than 6 percent of the gross world product, the global education sector has been growing at a 4.5 percent compound annual growth rate (CAGR) and is forecasted to be worth $10 trillion by 2030.