Operations | Monitoring | ITSM | DevOps | Cloud

Latest Videos

Leveraging behavior analytics and machine learning algorithms in your PAM strategy

Modern technologies like machine learning (ML) algorithms can introduce a forward-thinking outlook to privileged access management (PAM) and enable enterprises to predict emerging access risks in real time. ML-based anomaly detection systems can deeply analyze raw data collected around privileged activity, profile standard user behavior patterns, and then surveil future operations to detect any deviations from the norm, such as server logins after office hours.

Vulnerability assessment | ManageEngine Vulnerability Manager Plus

ManageEngine Vulnerability Manager Plus is a prioritization driven threat and vulnerability management solution for enterprises with built-in remediation. This video covers how you can utilize Vulnerability Manager Plus to discover vulnerabilities, put them in context to understand their impact and urgency, and swiftly remediate the imminent vulnerabilities with a built-in patching workflow.

Network Configuration Manager - One-stop solution for your network configuration management needs.

ManageEngine Network Configuration Manager is a multi-vendor configuration management solution for switches, routers, firewalls, and other network devices. Many IT admins worldwide opt for Network Configuration Manager for its simple interface and powerful configuration management at a very basic price.

Combating cyberthreats with a sound PAM strategy in 2020

In this on-demand webinar, we'll walk you through reasons a PAM program is necessary, introduce the typical PAM maturity curve, and discuss real-world use cases on how a PAM program will fit into your overall enterprise IT operations. In addition, we'll look at ManageEngine's strategy and offerings to help you build a sound, foolproof PAM program.

Building an effective IT asset management strategy with ServiceDesk Plus Cloud

In this session of ManageEngine's Masterclass 2020, we will discuss how to manage all assets in your organization's IT infrastructure, and optimize asset usage. Stay on top of your assets with an IT asset management (ITAM) strategy that helps you keep track of both hardware and software assets throughout their entire life cycle.