Search results for: applications manager

The Active Directory Advisor

Welcome to the newest and coolest place to get Active Directory solutions and tips. I’m Derek Melber, here to provide you with the most relevant,...

Active Directory 3 min read Read

​The Heartbleed Bug: How to Mitigate Risks with Better Password Management

– – – – – – – – – – – – –  – – –  – – –  – – – – – –...

Password Manager Pro 5 min read Read

Will passwords become obsolete soon?

Will passwords soon become a thing of the past? Have they already become obsolete? This is perhaps one of the most prominent topics under discussion...

Password Manager Pro 3 min read Read

5 Reasons Your Help Desk Should Get in the SaaS Lane

Forrester recently announced the results of their third annual ITSM survey at Fusion 2013, a conference for IT Service Management professionals.  Summing up the experience there in a recent...

OnDemand 2 min read Read

PCI DSS 3.0: Shifting focus on daily review of ‘security-relevant’ logs to identify suspicious activities [Part-3]

Ever since the release of the PCI DSS version 3.0 change highlights by the PCI Security Standards Council (PCI SSC), stakeholders of payment card industry and security analysts have been busy...

EventLogAnalyzer 3 min read Read

PCI-DSS 3.0: The Stress on Password Protection & Security [Part-2]

[In the previous post, we briefly discussed the requirements proposed for PCI-DSS 3.0. In this post, we’ll discuss the requirements in depth.] When a customer...

Password Manager Pro 4 min read Read

Top Tips for IT Job Seekers, APM Business Benefits, and More

“Five top tips for job-seeking IT graduates” presents the job skills Raj Sabhlok, president of ManageEngine, believes will get you employed. Australia’s Technology Spectator apparently agrees because the magazine covered Raj’s article. Want to...

General 1 min read Read

Spate of shocking cyber attacks on universities jolt academia

It is hauntingly clear – cyber criminals have set their eyes firmly on universities, research institutions, and centers of higher learning in the United States...

DeviceExpert , EventLogAnalyzer , Firewall Analyzer , General , IT Security , ManageEngine , Password Manager Pro 2 min read Read

IT outsourcing: When outsiders become insiders, how do you ensure information security?

Organizations outsource a part or whole of their IT services to third-party service providers for various reasons, such as cost savings, leveraging outside expertise, need...

EventLogAnalyzer , Firewall Analyzer , ManageEngine , Password Manager Pro 3 min read Read