IT security managers lay a lot of emphasis on conducting log forensics investigations. According to the SANS 2013 Digital Forensics Survey, 57% of the respondents...
Search results for: applications manager
itSMF India National Conference 2014: Introductions, Conversations, and Intense Learning
The annual conference of the IT service management forum (itSMF) happened in Bangalore, the Silicon Valley of India. We were at the conference for the first...
Automating Inactive User Controls
With so many compliance regulations requiring controls over inactive users, it is important to ensure that these user accounts in Active Directory are correctly managed....
Safeguard Your Computers Easily with Desktop Central’s Exclusive Patch Edition
Is your organization focusing on securing its network against operating system and application vulnerabilities to alleviate costs due to potential threats? Then you are perhaps...
Maximize Your Application Performance to Ensure Successful Business Outcomes – September 9, Forrester Webinar
Join Forrester and ManageEngine on a free, one-hour webinar that will help you discover ways to unlock the true prowess of application monitoring. Learn how to fully leverage the capabilities your...
Code Spaces AWS Security Breach: A Sad Reminder of the Importance of Cloud Environment Password Management
In the recently concluded Black Hat USA, 2014, one of the topics that drew much attention was the session on the pitfalls in cloud environment...
Combat Advanced Cyber Attacks With Shared Security Intelligence
(Originally published in Cyber Defense Magazine, Black Hat special edition) In this information age, even the mightiest of enterprises and governments across the globe are worried...