Search results for: Analytics Plus

Why VPNs on mobile devices are a crucial part of securing access to corporate data

Securing access to business resources has always been of high priority for admins and IT teams. In the wake of the pandemic, workforces are more...

Mobile Device Manager Plus 3 min read Read

Tackling your network security challenges using ManageEngine ITOM solutions

Network security management typically entails end-to-end management of the entire network security infrastructure of an enterprise. However, in this rapidly changing security ecosystem, there’s an...

Network 7 min read Read

Monitoring NGINX with Applications Manager

NGINX is open-source software that started out as a web server and now provides various solutions such as web serving, reverse proxying, caching, load balancing,...

Applications Manager 3 min read Read

2019 at a glance: Looking back on a journey of transformation

Mark Twain once said, “Twenty years from now you will be more disappointed by the things that you didn’t do than by the ones you did...

ManageEngine 3 min read Read

Find out which of your employees pose the greatest security risk

Among the different types of cyberattacks, insider threats are the hardest to track and have the highest rate of success. This can be attributed to...

ADAudit Plus 2 min read Read

Detecting first time processes on member servers to protect against attacks

In a previous blog, we saw how ADAudit Plus’ user behavior analytics (UBA) capabilities allow administrators to monitor user logon activity to identify compromised accounts....

ADAudit Plus 2 min read Read

Five reasons to choose Log360, part 4: Advanced security features

Part two and part three of this blog series gave a detailed look at Log360’s in-depth auditing capabilities, while part one explained how easy the...

Log360 3 min read Read

Monitoring user logon activity to identify compromised accounts

In a previous blog, we saw how ADAudit Plus’ user behavior analytics (UBA) capabilities allow administrators to monitor the file activity of users to identify anomalies. UBA in ADAudit...

ADAudit Plus 2 min read Read