Managed service providers, or MSPs, provide multi-faceted services that include monitoring network devices, servers, applications, bandwidth, and traffic. They also maintain customer-specific views and associated role-based access controls as well as provide restricted access to views.
However, MSPs can’t afford to run NOC operations on a per customer basis. Instead, MSPs may have to group devices or servers in individual business or customer groups and assign them to a technician or an administrator. This basically means MSPs must be flexible as well as rigid to ensure exceptional customer service. Let’s see how ManageEngine can help achieve just that.
ManageEngine IT360 MSP Ed…
“Five top tips for job-seeking IT graduates” presents the job skills Raj Sabhlok, president of ManageEngine, believes will get you employed. Australia’s Technology Spectator apparently agrees because the magazine covered Raj’s article.
Want to cut your inbound help desk inquiries by 30%? That’s what Certis Europe did. Check out “Certis Europe benefits from Application Manager” in Computer Business Review. The article explains how the crop protection company dramatically cut inbound help desk inquiries with ManageEngine’s Application Manager.
June saw some great coverage for ManageEngine. Here are some of the articles and interviews that were carried in leading publications.
Insider threats become primary security concern: ITP.net published an interview with ManageEngine on why companies in the UAE are more concerned with internal threats rather than external threats.
Steps to brush up on electronic security : Raj Sabhlok, president, Zoho Corp, wrote an article on how to prevent the NSA from reading your email, which was published in Gigaom.
IT360’s v.10.0 preview: Sridhar Iyengar, vice president of product management, ManageEngine, gave an exclusive interview to the CNME magazine at the FT Summit in Dubai.
Imagine every event occurring in the network/devices is recorded in real time, including the abnormal events. What else would you want? Obviously, a convenient way to scan through this information or capture the relevant ones online. This leads to monitoring the logs and events generated by diverse devices.
Log Monitoring/Analysis is already well known in the security and network management space. It is now beginning to gain prominence in the network operations space [Ack.: EMA Research]. The fact that every granular event is logged in real time means that you will find granular information at the device level and even at the session level. One of the advantages is, root cause analysis for certain situati…
It’s been a while since I have penned my thoughts on technology here
. Sometimes we find ourselves surrounded by vastly experienced and very busy personalities; and the experience is such that you feel to share it to peers, right?
Most of you might be aware of the ManageEngine user-conference which was held a few weeks back in Melbourne and Sydney (and we keep doing that around the globeJ). Such user conferences help our team to meet and interact with people who are using our products. It’s fun. Watch this section for more information about the next conference.
I was lucky enough to be part of our user-conference in Melbourne and Sydney and even luckier to speak about Integrated IT Management. I have bee…
We have been talking about real-time IT and its importance in business for quite a while now. One of the most important aspects of real-time IT is continuous monitoring which definitely is not an easy task as it involves sitting in front of a computer round–the–clock to monitor your IT infrastructure.
By integrating operations and service management under one console, with ManageEngine IT360 we successfully eliminated IT silos which previously existed in our customers’ environments. Moving ahead with the advancement in technology, which has …
I was researching a few sites related to Network Management and came across an interesting article on Network technology trends in 2012 with specific relation to Network Management. The author, Jim Frey , Research Director at Enterprise Management Associates [EMA] says, there are 3 key areas that one must look at, in 2012:
- Cross Domain management operations
- SaaS based network management
- Performance SLAs in Cloud monitoring
You may refer to this link for details:
What constitutes this Cross D…
In my previous blog on the subject, we discussed at length on what a BSG is, in the context of ManageEngine IT360. This concluding part 2, will take you through the other features of BSG.
An important feature is the capability to create a sub-group. You may create sub-groups under a group and associate devices to them. A sub-group is specific to a BSG. All other aspects of a sub-group is similar to a BSG, in terms of associating devices, applications, servers, specific monitors, setting thresholds, alarm actions, etc..
Another feature is the Device Dependency. When you associate a Monitor [maybe a network device, a physical server, an application, etc.] to a BSG as a dependent device, it helps you suppress alarm…
Yes, Yes!; the dissection of Real-time IT continues. From laying the introduction foundation of real-time IT to talking about business needs of the same, I shall talk about one of the most important technical aspects of real-time IT- an end user’s quality of experience. Why is this important? Well, I see this as the junction where end users and technology meet. This is where organizations must make sure that all the parameters and underlying supporting infrastructure should work perfectly to give an unmatched experience to end users.
Gartner says, “End-user experience monitori…