Recent Posts

Block Unwanted Applications in the Enterprise

Block Unwanted Applications in the Enterprise


IT teams often face the challenging task of curbing the use of certain applications. They can encounter numerous incidents where the organization’s sensitive information has the potential to be exploited. Security breaches, which often lead to numerous phishing scams and countless identity theft claims, make the news on a regular basis.

Business users today collaborate through email, instant messaging, and peer-to-peer applications. As collaboration increases, so do threats from hackers and malicious code, such as worms and viruses. Due to these harrowing threats, a major concern for IT admins today is to ensure that their machines are safe, and the organization’s confide

3 Killer Fe​atures in Your NMS That Can Drastically Minimize Network Downtime ​

Killer Features


Organizations across industries suffer hundreds of thousands of dollars in lost revenue and reduced productivity annually due to under performing or down networks. According to a 2014 Gartner study, the average cost of a down network can be up to $5,600 per minute, which extrapolates to well over $300K per hour. These down networks and their impact on the organization are risks that are simply not worth taking.

As a network administrator, you need to select the right Network Monitoring System (NMS) that can help you quickly resolve network issues and proactively monitor network performance. The NMS features must help you avert network disasters and resolve common network problems. Ideally, the NMS or t…

Just bump to enroll devices with Android Near Field Communication (NFC).


Bulk enrollment of corporate devices has always been a tedious task for mobile device management (MDM) IT administrators. As a silver lining for Android devices, ManageEngine Mobile Device Manager Plus now comes with an innovative method that will make bulk Android device enrollment easier than ever.  This novel feature simplifies the process to a bare minimum of just bumping devices to enroll, which saves both time and effort. 

Piqued your curiosity? Read on.

What it’s about.

This feature is called Android NFC Enrollment. Near Field Communication (NFC) enables data exchange for Android devices within a short range of up to four centimeters. It enables quick file transfers by lightly bumping or pla

Snapshot of Success: Australian Retail Giant Streamlines Vendor Access to IT Assets Using Password Manager Pro


E-commerce continues to be a game changer in the retail industry. But the change isn’t always for the better. Along with its promise of enormous growth and competitive advantage, e-commerce poses scores of security issues, including poorly managed, third-party vendor access that leave retailers vulnerable to  data theft and other criminal hacks. 

Password Manager Pro Case Study

When that access risk was made obvious to a leading retail giant in Australia, the company stepped up its security controls by replacing its existing password management tool with Password Manager Pro. With ManageEngine’s privileged access management solution in place, the retailer has secured its privileged accounts and established stron

ITAM Best Practice 2: Track the Complete Life Cycle of Assets


In the second blog post of this series you will learn how to track the complete life cycle of assets. The goal is to know the current state of each asset in your environment.

Organizations have their unique asset procurement, maintenance, and disposal policies. You need to frame an asset life cycle to cover all stages of an asset in your organization. Each asset stage can have one or more states associated to it.

 A typical asset life cycle configuration along with the associated asset states

  • Request for asset (requested)
  • Approval (waiting for approval, approved)
  • Procurement (purchased, leased)
  • Deployment (in installation, installed)
  • Usage (in use) 
  • Storage (in store, in repair)
  • Expiration (expired/d

What Private Equity Means for SolarWinds Users


Well, that was fast. Less than two weeks after SolarWinds committed to reviewing its “strategic alternatives,” the review is complete and the alternative chosen. The winning strategy? Go private.

Yesterday, SolarWinds announced that it is being taken private by Silver Lake Partners and Thoma Bravo, two prominent private equity firms. Technically, this is an acquisition. For SolarWinds stockholders – including SolarWinds management – it’s great news that pays $60.10 per share. For SolarWinds customers, the jury is still out.

I don’t have crystal ball, but I’ve been through the “go-private” drill. Under a go-private structure, a company pays out shareholders by rai

Securing user rights on Windows servers.


With over 35 user rights to choose from and configure on each and every Windows server, it’s important to pick those that have the highest impact and effect if compromised. First, you need to get the listing of user rights from each server. There are a few options, but an ideal solution is to run “secpol.msc” from the Run menu. You will then be presented with the local security policy, as shown in Figure 1.

secure user rights figure1

Figure 1. Local security policy from running “secpol.msc.”

As you can see in Figure 1, if you expand the window to Security SettingsLocal PoliciesUser Rights Assignment, you can view all of the user rights that are configured on the server. If you want to save the settings t