Search results for: applications manager

Solving a Cyber Crime Case Like Sherlock Holmes

IT security managers lay a lot of emphasis on conducting log forensics investigations. According to the SANS 2013 Digital Forensics Survey, 57% of the respondents...

EventLogAnalyzer 3 min read Read

itSMF India National Conference 2014: Introductions, Conversations, and Intense Learning

The annual conference of the IT service management forum (itSMF) happened in Bangalore, the Silicon Valley of India. We were at the conference for the first...

ServiceDesk Plus 1 min read Read

Active Directory Delegation: It Does Not Need to Be Hard!

One of the most important and powerful reasons that organizations consider Active Directory is the fact that delegation is built into the product. Windows NT...

ADManager Plus 4 min read Read

Automating Inactive User Controls

With so many compliance regulations requiring controls over inactive users, it is important to ensure that these user accounts in Active Directory are correctly managed....

ADManager Plus 1 min read Read

Safeguard Your Computers Easily with Desktop Central’s Exclusive Patch Edition

Is your organization focusing on securing its network against operating system and application vulnerabilities to alleviate costs due to potential threats?  Then you are perhaps...

Endpoint Central 2 min read Read

​Maximize Your Application Performance to Ensure Successful Business Outcomes – September 9, Forrester Webinar

Join Forrester and ManageEngine on a free, one-hour webinar that will help you discover ways to unlock the true prowess of application monitoring. Learn how to fully leverage the capabilities your...

Applications Manager 1 min read Read

Code Spaces AWS Security Breach: A Sad Reminder of the Importance of Cloud Environment Password Management

In the recently concluded Black Hat USA, 2014, one of the topics that drew much attention was the session on the pitfalls in cloud environment...

Password Manager Pro 4 min read Read

Combat Advanced Cyber Attacks With Shared Security Intelligence

(Originally published in Cyber Defense Magazine, Black Hat special edition) ​In this information age, even the mightiest of enterprises and governments across the globe are worried...

EventLogAnalyzer 3 min read Read