Category: ManageEngine

Five worthy reads: Is DataOps the next big value driver in the analytics ecosystem?

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. In this edition, we’ll learn about DataOps, an interesting methodology that can help organizations fast-track their data analytics operations.By Monisha RaviWith the current data trend, there is an ever-increasing demand for data professionals to transform raw […]

Launching RMM Central: A unified IT solution for managed service providers

By Nisha BalajeeWe’re pleased to introduce ManageEngine RMM Central, a unified remote monitoring and management solution.Maintaining the IT infrastructure and systems of client networks is a herculean task for IT service providers. Multiple tools perform various capabilities in network management, be it maintaining or managing workstations, laptops, servers, and other networks. Managed service providers (MSPs) […]

DHCP server monitoring made easy with OpUtils

By Sharon AbrahamIn today’s complex IT infrastructures, Dynamic Host Configuration Protocol (DHCP) servers play an indispensable role in automating IP allocation and configuration. A DHCP server’s capacity to allocate IPs to the requesting clients in real-time is one of the factors that ensures constant uptime of dynamic networks.However, even though a network’s availability depends on […]

Operation panopticon: How a weak IAM strategy led to the security camera hack across organizations

By AbhilashOn March 9, 2021, Verkada, a software company that specializes in making security cameras for monitoring physical access control, was subject to a security hack.Hackers gained access to the video feed of at least 15 thousand cameras deployed across various locations and exposed the inner workings of hospitals, clinics, and mental health institutions; banks; […]

Five worthy reads: Location intelligence—the key to next-level data utilization

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week we explore the rising scope of location intelligence in improving the overall customer experience.By Abirami AThe pandemic has pushed businesses out of their comfort zones and boosted digitization. Organizations have started to rely more […]

Five worthy reads: The unexpected costs following a cyberattack

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. In this edition, we’ll learn about the worst data breaches that happened recently, their impact, and the cost of data breaches for companies.The COVID-19 pandemic has not only had an impact on the mental and physical […]

Microsoft Patch Tuesday April 2021 fixes 108 vulnerabilities, including 5 zero-days

By Gokila KumarYet another month, yet another Patch Tuesday. With the never-ending cybersecurity threats brought on by the pandemic, it’s essential to understand the importance of Patch Tuesday releases and find ways to efficiently deploy the new updates to remote endpoints.This Patch Tuesday, Microsoft has released fixes for 108 vulnerabilities, among which 19 are classified […]

Microsoft Patch Tuesday March 2021 fixes 82 vulnerabilities, including 2 zero-days

With cybersecurity threats on the rise thanks to the pandemic, it’s essential to understand the importance of Patch Tuesday releases, and find ways to deploy them to remote endpoints efficiently.This Patch Tuesday, Microsoft has released fixes for 82 vulnerabilities, among which 10 are classified as Critical, and 72 as Important. Along with these vulnerabilities, Microsoft […]

Ransomware in 2021: What has changed? Detection and mitigation strategy

A ransomware attack is a bug that we can’t shake off. Or perhaps, it can even be called a shape-shifter that somehow finds a way into networks, no matter how many armed sentries you’ve deployed in and around your perimeter.The line between ransomware and a data breach is slowly fading. Threat actors prefer ransomware over […]