Operations | Monitoring | ITSM | DevOps | Cloud

July 2020

Unfolding the Twitter security incident

In case 2020 wasn’t dystopian enough, here’s some more unbelievable news. On July 15, 2020, social media giant Twitter admitted it fell victim to a security breach. The attackers targetted 130 Twitter accounts, including several belonging to high-profile individuals such as elected officials; former president Barack Obama; and business leaders including Bill Gates, Jeff Bezos, and Elon Musk.

Five worthy reads: Remote workplaces: Is hybrid the way to go?

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we discuss the merits of going hybrid in this era of distributed workforces and remote working culture. While it has become imperative for organizations to implement remote work policies, the question of cloud adoption has become almost unavoidable.

Three things every SharePoint administrator should monitor

Microsoft SharePoint is one of the most business-critical services in enterprise IT. It acts as a central warehouse that hosts large volumes of business data primarily stored for the purpose of internal collaborations among employees. It empowers users to access this data from anywhere, anytime, and from any device. Hence, any performance hiccup in a SharePoint environment could have major repercussions on the business continuity of an organization. Therefore, it is crucial to monitor SharePoint environments to ensure seamless workflow.

Expedite incident resolution with Analytics Plus app for ServiceNow

As a ServiceNow manager, have you ever wondered how you can deliver a satisfying customer experience to your end users without increasing headcount, or adding to the workload of your existing front-line workers? In a world of digital transformations and disruptions, providing swift and complete customer service is about finding and fixing gaps in existing incident management processes using data analytics.

Sponsored Post

ManageEngine named a 2020 Gartner Peer Insights Customers' Choice for IT Infrastructure Monitoring Tools

We at ManageEngine are excited to announce that OpManager and Applications Manager, have been named as 2020 Gartner Peer Insights Customers’ Choice for IT Infrastructure Monitoring Tools. Thanks to our customers who have reviewed our products for this distinction. To our customers, we look forward to shaping our products based on your feedback!

OpManager - Best Network Monitoring Software for Today's Networks

ManageEngine OpManager is an end-to-end network monitoring software that proactively monitors a wide range of network devices, servers, and VMs for fault and performance. It's easy to customize for every business needs and works out-of-the-box without requiring a steep learning curve. It's being used by over a million IT admins for over 15 years.

Security operations center, Part 1: The guardian of your organization

Hackers arm themselves with the latest technologies, employ different techniques, and try to exploit all possible vulnerabilities in the security of an organization. With these tools under their belt, hackers will persist until they get what they want. To stay one step ahead of hackers and remain up to date on cutting-edge technologies, your organization needs a dedicated team whose main objective is to detect and stop cyberattacks that threaten it.

Business Intelligence Group's 2020 Fortress Cyber Security Award for Threat Detection goes to...

We are excited to share that ManageEngine’s Log360 has been awarded the 2020 Fortress Cyber Security Award for Threat Detection. The Business Intelligence Group’s unique scoring system measures performance across multiple business domains.

Sponsored Post

Introducing the ITOM podcast: Listen and learn how to avoid remote work roadblocks in an IT environment

In administrating all technology and application requirements within an organization, IT operations management (ITOM) is pretty complex, and tends to send IT admins scrambling for authentic and actionable insights across the internet. We’re taking matters into our own hands and launching our very own podcast series to provide you valuable information on ITOM, which you can choose to listen to at your leisure or on the go!

Getting started with Analytics Plus for ServiceNow | ManageEngine Analytics Plus

Introducing Analytics Plus for ServiceNow, an enterprise-focused IT analytics platform that helps your derive deep insight from your ServiceNow processes. With 150+ pre-built reports and dashboards, you can get started with analyzing your ServiceNow data in a matter of minutes.

The LLMNR/NBT-NS strike

Link-Local Multicast Name Resolution (LLMNR) and NetBIOS Name Service (NBT-NS) are two protocols that are used to identify a host address on a network when the DNS name resolution, which is the conventional method, fails to do so. When a DNS server is unable to resolve a request from a requester machine, the latter broadcasts a message to its peer computers asking for the location of the required server. Hackers leverage this operation to steal the credentials of the requester machine.

ManageEngine named a 2020 Gartner Peer Insights Customers' Choice for Security Information and Event Management!

We’re excited to announce that ManageEngine has been recognized as a Customers’ Choice in 2020 Gartner Peer Insights “Voice of the Customer’: Security Information and Event Management (SIEM) for the second time. This is in addition to our recognition in Gartner’s Magic Quadrant for Security Information and Event Management, 2020 for four consecutive times. We are thrilled to be named this recognition yet again. What better way to be recognized than by our customers?

How to protect your IT infrastructure from a Maze ransomware attack

Pitney Bowes, a global package delivery giant, has been hit by a second ransomware attack in less than seven months, according to ZDNet. Those responsible for the attack have released screenshots portraying directory listings from inside the company’s network. What is Maze ransomware and what makes it so special?

Launching Desktop Central Cloud: Embrace UEM the SaaS way!

Desktop Central is a holistic unified endpoint management (UEM) solution that offers a dynamic approach to securing and managing user devices, including desktops, laptops, smartphones, and tablets. Already established as a leader in the UEM field, ManageEngine adds another feather to its cap by now offering a cloud-based UEM solution. Desktop Central Cloud gives you 360-degree control over all your network endpoints.

OpManager now supports SMSEagle, Twilio, and Clickatell, so you can get SMS alerts anywhere!

IT admins need to know the status of their IT devices, servers, routers, switches, and firewalls. To meet this need, OpManager has a highly responsive and robust notification and alerting system that sends alerts via email, Slack, and even SMS. Murphy’s law says anything that can go wrong will go wrong, and if you’re in IT, you’re probably familiar with how easily things can go wrong.

Email security in the post-COVID-19 era

Following the outbreak of COVID-19, organizations around the world have rapidly adopted remote work policies, making email communication more important than ever for disparate teams to collaborate. This has made it convenient for threat actors to launch email-based cyberattacks. The FBI has issued a public service announcement in which it revealed that it is anticipating business email compromise (BEC) attacks related to the COVID-19 crisis to increase. Hence, it's imperative for businesses to strengthen email security to mitigate email-borne threats.

Telecommunications giant reveals an Active Directory server breach. What can we learn from it?

We’ve always been vocal about the imminent threat of breaches and propagated the message that irrespective of the size of your business, the industry you’re in, or your geography, you can be subject to a security breach. And unfortunately, history repeats itself often. On May 11, 2020, Nippon Telegraph & Telephone (NTT), a large telecommunications company, revealed that attackers may have stolen data from its internal systems, affecting over 600 customers.

Leverage advanced analytics to secure your endpoint devices

With the new normal adding several more challenges and variables to the security layer, how do you ensure your data is safeguarded without increasing the workload or the headcount of your security team? Using advanced analytics, in tandem with endpoint monitoring applications such as ManageEngine’s Mobile Device Manager Plus and Desktop Central, will help you better visualize and analyze your endpoint data, identify patterns, and establish correlations.

Permissions, access rights, and privileges: Active Directory and Azure Active Directory

Permissions, access controls, user rights, or privileges define what an identity can see or do in an organization. These terms are often used interchangeably based on context, and essentially perform the same function—granting or denying access to the resources in an enterprise.

Docker monitoring made easy

Docker is a platform that enables developers to run software in packaged environments called containers. These containers are operating system (OS)-level virtualized elements that share a common Linux server yet have their software, libraries, and configuration files bundled within them. These containers can communicate with each other and exchange information, making it easier to develop and host multiple applications through the CI/CD DevOps methodology.