IT Security | July 3, 2017Protecting against Petya and other ransomwareAs a security professional, which do you fear more: 1) explaining to your boss or CEO that your enterprise's files are no longer accessible because...
Endpoint Central | June 30, 2017WannaCry again? Meet Adylkuzz, its sneaky cryptocurrency mining siblingMore than 400,000 computers wrldwide have been infected with WannaCry ransomware since the beginning of the...
Identity and access management | June 29, 2017Get notified when a folder is shared on servers and workstationsWe all know that sharing a folder on a server opens up an entry point to that server. Even if the share for...
IT Security | June 28, 2017Log management and SIEM fundamentals: Comprehensive log collection and auditingThe first step in SIEM is collecting log data. Log data, as we saw in part 1, is what drives any SIEM solution...
Endpoint Central | June 26, 2017If you think WannaCry is huge, wait for EternalRocks!While the world was responding to the WannaCry attack—which only utilized the EternalBlue...
General | June 25, 2017Free webinar: Ensuring security and consistency of end users' self-service actions in Active DirectoryAs an IT administrator, you've surely witnessed problems with users' self-service...
IT Security | June 22, 2017Log management and SIEM fundamentals: Getting startedCyber attacks and network breaches can bring even the largest organizations to their knees...
Endpoint Central | June 20, 2017Escape the latest sudo flaw with Desktop Central patch managementWindows has had a rough time lately, dealing with various breaches as the result of...
General | June 19, 2017ManageEngine wins Network Management Vendor of the Year in ICT Champion Awards 2017 It's time to celebrate another ManageEngine OpManager victory! This year, ManageEngine...
Identity and access management | June 16, 2017Save Active Directory reports in the file format you needAdministrators like CSV files. Auditors like HTML files. Executives like PDFs. We can go...