Operations | Monitoring | ITSM | DevOps | Cloud

ManageEngine

Five worthy reads: Data security is taking the world by storm

Information. Data. Personal details. Particulars. Intelligence. Call it what you like—the universal truth is that in the present age, personal data has become one of the most valuable possessions. Companies around the world are scrambling to secure the data they have collected, while those with malicious intentions are vying for these coveted bits of information.

Ransomware attacks continue to rise in 2018

It’s official. Ransomware isn’t just one of the most common types of malware, it is the most prevalent malware used in cyberattacks according to the 2018 Verizon Data Breach Investigations Report (DBIR). This report found that of the data breaches involving malware in 2017, 39 percent made use of ransomware, which was twice the amount used the previous year.

Connecting the logs with event correlation

Security information and event management (SIEM) helps with managing and analyzing the vast amount of log information generated by networks. Of all the capabilities of SIEM, event correlation is the most powerful. This technique analyzes log data from your servers, applications, routers, firewalls, and other network devices, and identifies patterns of activity that indicate potential attacks.

Five worthy reads: Revolutionizing IT with artificial intelligence

Netflix recommends Stranger Things to you because it knows you like watching sci-fi thrillers. Tinder lets you swipe right into your next date because it’s learned your interests and partner preferences. Amazon keeps showing you Fitbit because you’ve spent a considerable amount of time browsing through the fitness and wellness category.

New feature in Applications Manager: SAP MaxDB performance monitoring

SAP MaxDB is robust and reliable technology that is an immanent component of various mySAP technologies including APO (live cache) and KM. Since databases like MaxDB store huge amounts of data, in-depth monitoring is vital for optimal operation of these systems.

Five worthy reads: Unified endpoint management, a 360° look at organizational security

One of the most obvious effects of the digital age is the unprecedented advancements in technology. Thirty years back, driverless cars, missions to Mars, and AI-powered robots were pure science fiction. Today, all these things are close to being an everyday reality. And speaking of unparalleled innovations, who would’ve thought that the day would come when all the devices around us—from mobile devices to sensors and appliances—could exchange information amongst themselves.

Tailor alarm content to your specific needs using Alarm Modifier

DevOps teams use a number of monitoring, project management, log management, and other IT management tools to receive alerts when something’s up. While this helps IT teams keep their system up and running at all times, the content of the alerts sent by some applications might not be relevant or insightful to the technicians who work on those issues. Now, with the Alarm Modifier feature, you can add new fields to an alarm, modify existing fields, rename fields, or remove them altogether.