Tag: stumble-it

Networkworld Article on Network Security and ManageEngine NetFlow Analyzer

Folks, http://www.networkworld.com/community/node/79146 Recently I have read this article in NW that talks about the importance of network security and why medium and large enterprises started considering products that can offer APT. The answer to Network Security from ManageEngine is Advance Security Analysis Module

Workflow between Monitoring and Ticketing

An important aspect of any successful business today is a constant and consistent availability of IT Infrastructure. This boils down to a need for an IT monitoring system that can monitor the infrastructure round the clock. So what if my monitoring system is excellent

[Webinar]: What you need to know about Applications Manager Version 10.0

We recently released Applications Manager Version 10.0 and want to demonstrate to you how the new features work. For this purpose, we are organizing webinar sessions where we will discuss release 10.0 in depth

Allowing temporary access to sensitive IT resources

Assume the scenario below: You administer a sensitive IT resource – a database in production network containing important data. An emergency troubleshooting situation arises. A developer has to be provided time-limited, temporary access to the DBMS, say for a day

How do you deploy configuration changes to production network?

Administrators working on production networks often face the need to carry out changes to the configurations of switches, routers, firewalls and other devices. The change could be a trivial one to modify a minor setting or might be a major one like upgrading the firmware. In both the scenarios, configuration changes to a device in production network requires planning, coordination, attention, diligence and visibility

Performance based IT Shop Part 2

Not all IT problems come under the domain of the network engineer. In my previous Blog , I talked about IT shops having a hodge-podge set of tools. There are various reasons, but the real inefficiency is when these tools perform the same functions. There becomes a time and need to look at the IT problems from different perspectives. A few examples below: Kenn Nied, Senior Network Engineer at WA State Board for Community and Technical Colleges, illustrates this encounter. While looking at OpManager from a networking point of view, the operator sees alerts that a few switches and a firewall are unresponsive. Is it faulty equipment or an attack? Then turning to a Security mindset, he looks at ManageEngine Device Expert to see real time and historical configuration changes. In one case, it was identified that there was a Firewall rule change made and realized it was a misconfiguration that caused the switch unresponsive. Diagnostic time was minimal. Albert E.

An automated solution to enforce IT policy on standard password practices

Growing instances of information security incidents have forced IT enterprises to put an effective IT policy in place. All such policies stress three essentials, among the numerous guidelines: Usage of unique, strong passwords across all IT resources Rotating the passwords at periodic intervals Role-based access controls for IT resources Enforcing the IT policy with respect to the privileged passwords turns out to be a daunting task to carry out manually.