Operations | Monitoring | ITSM | DevOps | Cloud

ManageEngine

The what, why, and how of using network IP scanners in IP-centric IT infrastructures

A simple command-line interface (CLI) ping will give you details about your target IP address. However, you may have to input the ipconfig command, and then the arp-a command to fully discover the status of an IP, and this is just for one IP address. Now imagine doing this for an IP block of 300 IPs, or even 50 IPs, or doing the same task periodically to manage your IP pool of thousands of addresses and their metrics. Seems like an Herculean task for any network admin!

Abu Dhabi's Khalifa University enables high quality technical education with a little help from OpManager

By sharing some ManageEngine OpManager customer success stories, we aim to help our users understand this integrated network management solution, including it’s powerful functionality. We hope this enables evaluators and users to make informed decisions. Let’s begin with the story. UAE’s Khalifa University offers excellent, world-class education. But exceptionalness does not mean monitoring and maintaining its IT infrastructure comes easy.

Features to check for in a network scanner for enterprise networks

Network scanners have become an integral part of every IT admin’s first line of defense against security breaches. Using the right network scanner tool to conduct effective network reconnaissance and diagnosis enables you to pinpoint network issues that can escalate to security risks and network mishaps. A typical network scanner would allow you to scan a range of IP addresses sequentially, and display the active devices within that address block.

Connect S.P.A. ups its network performance management game with OpManager!

Connect S.P.A. is a European IT company offering services in networking, wireless, security, monitoring, data center, and servers. It has two data centers and nine servers. Before finding OpManager, the IT company was using a network monitoring tool, but it did not offer enough visibility into its network, which made it difficult to troubleshoot and fix recurrent network issues. This led to unpleasant network downtime experiences, especially since the tool Connect S.P.A.

Why ManageEngine PAM360 is the ultimate privileged access management solution

At ManageEngine, we‘re building one of the most comprehensive and tightly integrated IT management software suites on the market. We have over 90 products and free tools to manage all your IT needs, including Active Directory management, help desk management, desktop and mobile device management, network and server management, application management, IT security, and analytics.

IT security under attack: Credential dumping attacks in Windows environments

Most of the time, threat actors in the cybersecurity landscape don’t employ advanced techniques and tools to intrude and establish a foothold within networks. Often, they disguise malicious operations by mimicking the activities of legitimate users, leaving behind little to no footprint. Blending malicious actions with day-to-day IT activities helps attackers maintain a low profile and remain undetected for a longer period.

Dissecting the need for ethical AI

Until recently, topics like data ethics and ethics in AI were limited to academic circles and non-profit organizations rallying for citizen data rights. Fast forward to 2020, and the scenario is very different; AI ethics has become a mainstream topic that's a top priority for big organizations. With data collection and processing capabilities growing by the day, it's become easier than ever to train machine learning (ML) models on this collected data. However, organizations have come to realize that, without building transparency, explainability, and impartiality into their AI models, they're likely to do more harm than good to their business. This podcast will explore why ethical AI is the need of the hour, and what key factors AI leaders should consider before implementing AI in their organization's ecosystem.

Five worthy reads: Make data security your New Year's resolution

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. More than ever, now is the time for organizations to prioritize data security. This week we look at some data security trends that are shaping the industry today. Illustration by Balaji KR A recent study conducted by RiskBased Security has labeled 2020 the worst year for data security with a shocking 36 billion records compromised, twice the number from 2019.