Operations | Monitoring | ITSM | DevOps | Cloud

ManageEngine

Key metrics for PostgreSQL performance monitoring

PostgreSQL offers flexibility on how data is stored and compared in a relational database. This is why it’s so popular among enterprises as a solution for their database requirements. Although PostgreSQL is quite reliable, database problems are inevitable, especially in large-scale environments. Ignoring these problems could result in a plunge in the productivity of your business.

Cyber-hygiene 101 during remote working: Protecting your digital identities with multi-factor authentication

When organizations shift to a work-from-home environment, identity and access management (IAM) takes center stage. Organizations with remote workforces must fortify their IAM policies and tools for a better user experience to ensure productivity, while also handling all the security challenges remote work presents to ensure data and system security. One of the biggest risks an organization faces when its workforce goes remote is unnecessary and unauthorized access to organizational data.

What is modern management, and how will it revolutionize enterprise IT management?

IT departments have experienced numerous changes in the way they manage and control user devices. Starting with the traditional CRT monitor-based computers, to modern smartphones, technological developments have been remarkable. Additionally, with the COVID-19 pandemic, employees are restricted to work from home, making the IT administration routines challenging for system administrators.

Patch Manager Plus now offers support for drivers and BIOS updates

Among the updates that we ignore most are driver updates, and sometimes for good reason. There have been plenty of cases wherein a driver update caused more harm than good. This could be due to two reasons. One, the user blindly clicked the update without taking a minute to read what the update actually achieves, or two, the user was not equipped to understand what the update achieves. Whatever the reason, one thing is clear: we cannot leave the cybersecurity of an organization up to chance.

[Webinar] Solve process-based problems to transform IT organization

This on-demand webinar covers:

  1. The challenges organizations face in their journey to compliance and how to handle them
  2. How to bring accountability and clarity to your processes
  3. A unique approach to customized risk assessment
  4. Approaching regulations and standards: Case studies of the GDPR and ISO 27001
  5. A framework to help you build a platform for compliance

Managing VPN connections will help businesses face today's adversity as well as prepare for tomorrow's opportunity

The onslaught of the novel COVID-19 has caught businesses off guard, sending many of them into a tailspin. To survive this, most businesses are considering the idea of remote work, and some have already implemented work from home policies. Under these circumstances, a virtual private network (VPN) is an organization’s best bet for providing access to business-critical services remotely and to avert operational disasters.

Hardening Windows security: How to secure your organization-Part 3

This is the final blog of our three-part blog series on living-off-the-land (LOTL) attacks. If you missed last week’s blog, you can read it here. LOTL attacks are also known as “malware-free” attacks because your own tools are used against you, either to hide malicious activities under a legitimate system process, or to leverage genuine system activities for malicious purposes.

7 ITIL® 4 tips for service professionals by the ITIL 4 co-author | ITIL 4 overview, benefits & more

Presented by Barclay Rae, ITIL 4 co-author and a well-known ITSM consultant, this webinar focuses on the practical application of ITIL 4, using value streams, and the various areas of professionalism that are now included as part of the ITIL 4 portfolio.

Breaking down the San Francisco airport hack

On April 7, 2020, the San Francisco International Airport (SFO) released a notice confirming that two of its websites, SFOConnect.com and SFOConstruction.com, were targets of a cyberattack in March 2020. The attack has been attributed to a hacker group that was attempting to steal the Windows logins of the airport’s employees. When we hear news about cyberattacks, a few typical, yet crucial questions spring to mind: How did the attackers perform the cyberattack?