Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Telecommunications giant reveals an Active Directory server breach. What can we learn from it?

We’ve always been vocal about the imminent threat of breaches and propagated the message that irrespective of the size of your business, the industry you’re in, or your geography, you can be subject to a security breach. And unfortunately, history repeats itself often. On May 11, 2020, Nippon Telegraph & Telephone (NTT), a large telecommunications company, revealed that attackers may have stolen data from its internal systems, affecting over 600 customers.

Leverage advanced analytics to secure your endpoint devices

With the new normal adding several more challenges and variables to the security layer, how do you ensure your data is safeguarded without increasing the workload or the headcount of your security team? Using advanced analytics, in tandem with endpoint monitoring applications such as ManageEngine’s Mobile Device Manager Plus and Desktop Central, will help you better visualize and analyze your endpoint data, identify patterns, and establish correlations.

Permissions, access rights, and privileges: Active Directory and Azure Active Directory

Permissions, access controls, user rights, or privileges define what an identity can see or do in an organization. These terms are often used interchangeably based on context, and essentially perform the same function—granting or denying access to the resources in an enterprise.

Docker monitoring made easy

Docker is a platform that enables developers to run software in packaged environments called containers. These containers are operating system (OS)-level virtualized elements that share a common Linux server yet have their software, libraries, and configuration files bundled within them. These containers can communicate with each other and exchange information, making it easier to develop and host multiple applications through the CI/CD DevOps methodology.

The missing link to comprehensive endpoint security

Very few things available online are truly free of cost. If you don’t pay with cash, chances are you are paying with your personal information or other data. The Chrome web store is filled with free extensions that users install on their browsers to enhance their online experience. However, more and more of these extensions are being discovered and removed from the store due to their malicious intent.

Overcoming VPN bandwidth and capacity complications using Firewall Analyzer

As companies move towards a flexible, remote work environment, the demand for VPN services has increased considerably. This need to ramp up VPN infrastructures in such a short time comes with its fair share of operational problems and security concerns. Over purchasing VPN capacity would put a dent in the IT budget while under purchasing would result in loss of productivity.

Leveraging IoT to target pain points in the healthcare industry

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. Most healthcare facilities already use the Internet of Things (I0T) to make their environment a more efficient and safer place, and this week, we show you how IoT is revolutionizing the healthcare industry. As the world’s population grows, so does the need for quality medical assistance and healthcare.

Minimize business losses by monitoring your applications' performance

Downtime is the biggest nightmare for organizations that capitalize on technology. A study about enterprise outages found that nearly 96 percent of enterprises had faced downtime in the past three years. Businesses lose a minimum of $1.55 million annually and 545 hours of staff time due to IT downtime. Up to 51 percent of downtime is preventable, which means businesses are spending on damage control when these resources could be diverted to something more fruitful, like R&D.

Infrastructure dashboards: Declutter your monitoring data and ensure you're not overspending

The task of monitoring and managing an entire network, including all the servers and applications that run on it, is by no means easy. With so many components of varying complexity, the volume of performance data coming at you can be overwhelming. This information overload increases the chances of missing data that could help discover performance inefficiencies.