IT Security


Looking beyond Windows part 1: Syslog management

Network security management is about more than just your Windows machines. You probably already know that. But did you know that when it comes to combating security breaches, you need to trace network intrusions at the peripheral device level?

EventLogAnalyzer 2 min read

The word’s out: We’re in the Gartner Magic Quadrant.

ManageEngine’s integrated SIEM solution, Log360, made it to the Gartner’s Magic Quadrant as the only new vendor! This awesome news is proof of our continuous effort to provide our customers a simple, efficient, and cost-effective SIEM solution.


What’s SIEM

IT Security 2 min read

Why riding the wave in 2016 was a good idea for Password Manager Pro

“The Forrester Wave
TM: Privileged Identity Management Q3 2016″
is out and has named Password Manager Pro a Strong Performer. We are happy to hear this news and feel that Forrester’s report on the privileged identity management (PIM)

Password Manager Pro 2 min read

What you ought to know about the common cybercrime techniques of 2016

2015 was the year of bold and sophisticated cybercrimes in Australia when major corporations such as The Commonwealth Bank, Target,T-Mobile, K-mart, X-box, Anthem Inc., and Slack lost millions of dollars in security breaches and lost data records. You can expect …

IT Security 6 min read

Enhancing IT security with adaptive security architecture – part 2


In my previous blog, we learned about the basics of adaptive security architecture .We also learnt why enterprises need to focus on a more comprehensive and progressive approach to address their IT security risks.In this blog, we will learn

IT Security 3 min read

Enhancing IT security with adaptive security architecture – part 1

adaptive-security-architectureAccording to a recent report by Deloitte, the average cost of a data breach to a single Australian business is more than $2.5 million per year. On top of that, the average breach compromises more than 20,000 records (accounts …

IT Security 2 min read

Snapshot of success: Password Manager Pro helps Indian Internet service provider regulate privileged access to its data centers.

Being a triple-play service provider in India is no easy work. The bundled offering of multiple services (Internet, telephone, and television) calls for a sophisticated data center infrastructure that can handle the wide scale of operations, manage all services simultaneously, …

Password Manager Pro 1 min read

Snapshot of success: Australian retail giant streamlines vendor access to IT assets using Password Manager Pro.

E-commerce continues to be a game changer in the retail industry. But the change isn’t always for the better. Along with its promise of enormous growth and competitive advantage, e-commerce poses scores of security issues, including poorly managed, third-party vendor

Password Manager Pro 1 min read

Success Story: A Leading Bank in Netherlands Centrally Controls Privileged Access with Password Manager Pro

Against the backdrop of the ever-increasing cyber attacks, government and industry regulations prescribe stringent security measures for banking and financial institutions to safeguard customer data. With information security as the highest priority and tasked with the responsibility

Password Manager Pro 1 min read