Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Five worthy reads: Make data security your New Year's resolution

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. More than ever, now is the time for organizations to prioritize data security. This week we look at some data security trends that are shaping the industry today. Illustration by Balaji KR A recent study conducted by RiskBased Security has labeled 2020 the worst year for data security with a shocking 36 billion records compromised, twice the number from 2019.

Manage IT on the go with our incredibly effective mobile apps!

Even an insignificant network issue can wreck havoc on your IT infrastructure when left unmanaged. This makes it vital that your IT team is alerted instantly whenever an issue arises, so they can troubleshoot it quickly, and ensure network stability. However, IT teams aren’t sitting at their desks waiting for problems to happen. It’s not uncommon for IT staff to be away from their workstations addressing network issues such as a router failure or a faulty LAN cable.

German research organization bids adieu to multiple management platforms using OpManager

GFK is Germany’s largest market research institute and the fourth biggest market research organization in the world. It has a global digital presence in over 60 countries, with around 120 offices, and has been providing consumer and market insights for over 85 years. How OpManager helped GFK GFK struggled to find the right solution while managing its data centers and relied on too many management platforms.

Protect your organization against Adrozek

Adrozek is a malicious browser modifier that, when installed on users’ machines, infects them with adware. This particular strain of malware has been making rounds since May 2020; according to Microsoft, it was at its peak in August, when as many as 30,000 computers were affected per day. Although classified as adware, Adrozek is also designed to collect information extracted from browsers by modifying browser settings and extensions.

Wake on LAN with IP address manager: A holistic approach to remote booting

Wake on LAN(WOL) has been a go-to solution for most network admins to ensure an uninterrupted IT resource. Aiding in remote booting of wired and wireless networks, WoL helps optimize energy usage even as it ensures your network resources are readily available. Enabling you to boot your machines on demand, and switch them to a low power mode when not in use, WoL saves you hefty power bills and helps you avoid the time-consuming manual task of restarting your network devices physically.

Why do businesses need network mapping software?

Networks are rapidly becoming larger and more complex, with numerous different technologies playing into their expansion. Network mapping is increasingly important for network administrators tasked with handling these growing networks. Network mapping provides network admins with a visual map so they can check network performance, the status of connected devices, monitor the network, and analyse networks before initiating troubleshooting efforts.

ITOM basics: Process monitoring

Monitoring the performance of server infrastructure is crucial to any organization. While metrics such as health and availability will sometimes suffice for measuring overall efficiency, getting visibility into more details, such as the underlying processes, tasks, and scheduled jobs, is often crucial for not just identifying a performance problem but also isolating its root cause.

IT security under attack: Why are group memberships so crucial?

Security groups either make or break your IT security. Group memberships are responsible for administrative access in your your network and define access to other privileged resources and data on your domain. Ever wondered how a simple misconfiguration of a group membership could lead to a security incident? This blog elaborates the most common misconfiguration or security loopholes that can cause damage to the sensitive data in your network.

Five worthy reads: Decision intelligence for critical business moments

AI and analytics are playing critical roles in driving innovation among many businesses riding the digital transformation wave during this pandemic. Many business leaders realize that people are not wired to think exponentially, but incrementally in a linear world, unable to see the ripple effects of their actions. The pandemic has highlighted the enormous impact this has on the quality of decisions made, especially in the context of business.

Securing a distributed workspace: A cybersecurity checklist for long-term remote work

One of the lasting changes brought about by the COVID-19 pandemic is that it forced organizations to rethink the concept of a workspace. As remote work became inevitable, IT teams had to enable the secure transition to remote work almost overnight. Opening up offices, on the contrary, will likely be executed in planned phases. A United States Department of State advisory recommends that workforces return to an office in three phases, with the employees most at risk coming in at a later stage.