Tag: enterprise-it-management

Success Story: Netherland’s Top Research University Consolidates & Streamlines Privileged Password Management Processes using Password Manager…

Wageningen UR, an institution of international repute in the sphere of Life Sciences deals with a huge collection of intellectual property, scientific literature, confidential data, research records, details about the staff and students and a host of other sensitive information. Needless to say, the IT department of Wageningen UR is tasked with the challenge of safe upkeep of disparate IT infrastructure, combating cyber-attacks, ensuring information security and network availability. Manual Password Management Processes like maintaining privileged passwords on paper in a safe proved highly inefficient and drove users to create individual password management solutions at Wageningen UR.

How to prevent DoS attacks?

DoS attacks are one of the most dreaded form of network attacks among Enterprises and SMBs since they could paralyze network activity completely. The after-effects of these attacks are even more that they have a long-standing impact on the image of the brand if the company caters to the consumer segment. If Amazon has a DoS attack on its network, it will hit the headlines in a few hours.

Upgrading Applications Manager’s AS400 monitor- Take Part in our Survey

We had announced support for monitoring AS400/ iSeries servers , a couple of years back. And now,   we are happy to announce, that our AS400 monitor is about to get a makeover!! We’re already working on a few enhancements to the AS400 monitor. Here is a sneak peak into what you can expect from the new AS400 monitor: • Specific Job(s) Monitoring : This feature intends to allow the user to monitor specific job(s) which are more important to them, by choosing the option “Add Job(s) to Monitor”

Tracking Workstation Logon/Logoff using ADAudit Plus

Before getting into the specifics, I would like to give a small introduction on tracking Logon / Logoff in Active Directory environment, which is a cumbersome process. Auditing the Windows Active Directory environment Logon Auditing With the current Windows architecture it’s difficult to get all logon data at a single point

Worried of FBI’s Blackout? Let ME help you to fix your DNS

This is in continuation with this post on FBI shutting down the stand-in DNS Servers on March 8, 2012 and its implications In short, the computers affected by the DNSChanger Trojan will not be able to connect to the internet after March 8 until the DNS Settings have been fixed. The DNS Checker tool discussed in the above blog post helps you primarily find whether your system is infected with the DNSChanger Trojan. You will have to fix your DNS Settings manually to be able to connect to the internet.

Flexible NetFlow configuration in Cisco 4500 with Supervisor Engine 7-E and Cisco IOS XE

Catalyst 4500 series switches with Supervisor Engine 7-E and Cisco IOS XE Software Release 3.1.0 SG supports Flexible NetFlow. Hence we thought of sharing the configuration information with you. The configuration of Flexible NetFlow in these switches is similar to the other regular Flexible NetFlow .