User account creation is a long-winded process that involves various configurations. Such a tiresome, manual process is naturally prone to errors, especially while creating user accounts...
Free Active Directory management tools: Part 1 – Managing passwords
Passwords are the first line of cyberdefense, and an organization cannot afford to have weak passwords, poorly-configured password policies, or even worse, empty passwords. Discovering...

Securing VPN and RDP access to sensitive resources [Free e-book and webinar]
At times, life during COVID-19 pandemic can feel like something from a dystopian novel. If anyone told us ahead of time that we’d be working from...
CybersecAsia Awards 2020 recognizes ManageEngine for its leadership in cybersecurity
ManageEngine’s Log360 was recently honored with the CybersecAsia Award for the Best User and Entity Behavior Analytics software application. The award certifies the important role, and the...

Alert AA20-302A: Federal agencies warn about ransomware attacks targeting hospitals
“We have credible information of an increased and imminent cybercrime threat to U.S. hospitals and healthcare providers.” – FBI, CISA, and HHS A cybersecurity bulletin...
Is IT security under attack?
From credential theft to network vulnerability exploitation and ransomware incidents on highly secure organizations, the year 2020 has been surprisingly rough on IT security. In the wake...

Dealing with data glut: Why ROT data is an issue, and how to manage it
“Unstructured data accounts for as much as 80 percent of an organization’s data footprint.” – Gartner As file storage grows rapidly year after year, new...
Domain controller patch alert! Vulnerability grants domain admin access in 10 seconds
A critical Active Directory vulnerability (CVE-2020-1472) has been making headlines for being the most notorious elevation of privilege bug because it can affect all computers...
Automate employee life cycle management with the ADManager Plus-Ultipro integration
Enterprise employee management is inherently challenging. On average, an IT administrator spends several hours to create user identities in Active Directory (AD) and grant role-based...