Operations | Monitoring | ITSM | DevOps | Cloud

ManageEngine

Dealing with three pathbreaking scenarios under the CCPA

“I’d like to pay with my credit card.” “Sure! Let me have your card. Could I also get your full name, phone number, and address?” “Yeah. It’s Logan Lovato, and I live at 1 Lemon Street, Anaheim. My number is 714.308.75xx.” This was a common occurence at retail stores across the US in the not too distant past. People shared their information and didn’t think much about it.

Five reasons to choose Log360, part 5: Integrated compliance management

So far in this blog series, we’ve seen how Log360 is simple to get up and running, allows you to receive a central view of multiple environments, provides deep auditing capabilities across these environments, and comes with advanced security features to deal with all manner of security incidents. In the concluding post of this blog series, we’ll look at another highly essential component of SIEM solutions: integrated compliance management.

Five worthy reads: Is your enterprise dealing with data sprawl properly?

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we define what data sprawl is and how organizations can cope with it effectively. Data sprawl—defined as the proliferation of data into endpoints, servers, applications, BYODs, operating systems, network environments, and even other geo-servers—can be a challenge to monitor and control.

Exciting news about ServiceDesk Plus' IT asset management module

We’re delighted to announce that ServiceDesk Plus, our flagship IT service management (ITSM) solution, received PinkVERIFY 2011 certification for its IT asset management (ITAM) processes. This adds to ServiceDesk Plus’ existing PinkVERIFY certifications for its incident management, request fulfillment, and change management processes.

OpManager bags gold-listed in Feedspot's top networking blogs and sites to follow in 2019

Great news! The OpManager blog has ranked #15 in Feedspot’s top 100 networking blogs and websites to follow. This is a particularly big deal for ManageEngine as we focus on creating valuable content for IT admins, and to be recognized for that confirms we’re headed in the right direction.

Agent Smith materializes from the matrix of Android malware

There’s a new shapeshifting strain of Android malware in the mix. It replaces legitimate apps with compromised ones and is imaginatively named Agent Smith after the iconic villain in The Matrix. Yet another malware attack targeting Android—so what’s the big deal? Agent Smith is similar to other malware campaigns such as Gooligan, HummingBad, and CopyCat with respect to the destruction it can cause via fraudulent ads.