Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

The Sound of Silence: Threats from Without and Threats from Within

Recent news has broken about a group of hackers which appears to be operating out of Russia. The group, dubbed “Silence,” is believed to be involved in the theft of over $800,000 from multiple Russian and Eastern European financial institutions. However, what is particularly notable about this group is they seem to count at least one former cyber security professional among their number.

Are your IT management practices IoT-ready?

2017 was supposed to be the year of the Internet of Things (IoT)—the year that this highly-touted technology matured and started producing tangible results for organizations. However, the last 12 months have left advocates of IoT frustrated. A report from Cisco claims that close to 75 percent of all IoT projects fail, and IoT as a buzzword has been replaced by the likes of artificial intelligence and blockchain. This disheartening news paints a grim picture for IoT.

The Top 6 Cyber Threats that Keep Businesses up at Night

Few things put more fear into the hearts of IT departments than the thought of a massive cyber attack — and for good reason. In 2017, the average cost of security breaches for U.S. organizations was estimated at $3.5 million. But it’s not all about the money. In addition to the financial burden caused by cyber attacks, the loss of client trust and credibility post-breach can be extremely difficult to bounce back from.

Simplifying security auditing, part 5: Detecting network attacks

Anyone trying to access resources in your network needs to interact with your network devices: firewalls, routers, switches, and IDS/IPSs. Each of these devices generate syslogs that contain important security information and must be audited to gain complete visibility into the activities occurring in your network. Most SIEM solutions, including our own Log360, can collect and analyze syslogs in real time and instantly alert security teams if any security event of interest occurs.

ManageEngine Strengthens Endpoint Security with the Launch of Browser Security Plus at London User Conference

LONDON - Sept. 18, 2018 - ManageEngine, the real-time IT management company, today announced its launch of Browser Security Plus, a browser management solution that helps organisations secure their corporate data in the cloud and protect their networks from web-based cyberattacks. Available immediately, Browser Security Plus provides organisations with a layer of management capabilities for browsers and their add-ons to maintain robust enterprise security.

Quest Enhances KACE Systems Management Appliance to Meet Demands of Fast-Growing Endpoint Environments

ALISO VIEJO, CALIF. – September 17, 2018 – Quest Software, a global systems management, data protection and security software provider, today announced the general availability of KACE Systems Management Appliance (SMA) 9.0. A comprehensive, multi-platform endpoint and asset management solution that helps businesses proactively provision, manage, secure and service their growing endpoint environments.

GDPR Compliance Auditing Tips

Now that the General Data Protection Regulation (GDPR), drawn up by the European Union (EU), has finally come into effect, many of the affected organizations have been scrambling to keep up with the auditing and operational requirements of a compliance regime that’s widely recognized as one of the most stringent and comprehensive regulatory frameworks ever devised for protecting data privacy.