Don’t let your administrative passwords become Pulcinella’s Secrets!

If you wonder what the phrase ‘Pulcinella’s Secret’ means, let me start with explaining that: Pulcinella is a popular comic character in Commedia dell’Arte, a...

Password Manager Pro 3 min read Read

Lessons from Sony PSN breach

The breach at Sony Play Station Network (PSN) breach creates a lot of doubts in the IT Security manager’s mind. We can take our lessons...

EventLogAnalyzer 2 min read Read

Is PCI DSS enforcement is only banking companies?

No, PCI DSS compliance may not be limited to Banking and Payment Card companies. It may be enforced for any company handling customer credit card...

EventLogAnalyzer 1 min read Read

Brute force attacks could crack 20% of the passwords of government agencies: Audit Report

An audit conducted by the Australian National Audit Office (ANAO), has concluded that brute force attacks could result in compromising about 20 per cent of...

Password Manager Pro 2 min read Read

ManageEngine – The Virtual Fortress for Your Enterprise!

Today’s enterprises are facing unprecedented security threats. As organizations embrace new technologies, newer threats keep pace. Safeguarding the enterprise from evolving, sophisticated threats is the...

Password Manager Pro 1 min read Read

98% of the customers repose trust in Password Manager Pro

After purchasing a product – be it a domestic commodity or a software, quite often, we might end up feeling that the product is just...

Password Manager Pro 2 min read Read

2011: A New Year’s resolution to protect your data, sensitive information & business!

Bidding adieu to 2010, the old year and a brand new 2011 is at the doorsteps! It is again that time of the year when...

Password Manager Pro 2 min read Read

Merry Christmas! And, lets have a “leak-free” New Year 2011!

2010 had been a terrific year! The concluding days were dominated by WikiLeaks exposures, which have come as a rude shock to many, big surprise...

Password Manager Pro 1 min read Read

What to Look for in a Log Management Application – Check the Checklist!

T?he current dynamic IT scenario ascertains the importance of security logs because of the rise in hackers activities. The resultant requirement is an event log...

EventLogAnalyzer 2 min read Read