Operations | Monitoring | ITSM | DevOps | Cloud

July 2019

Five reasons to choose Log360, part 5: Integrated compliance management

So far in this blog series, we’ve seen how Log360 is simple to get up and running, allows you to receive a central view of multiple environments, provides deep auditing capabilities across these environments, and comes with advanced security features to deal with all manner of security incidents. In the concluding post of this blog series, we’ll look at another highly essential component of SIEM solutions: integrated compliance management.

Five worthy reads: Is your enterprise dealing with data sprawl properly?

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we define what data sprawl is and how organizations can cope with it effectively. Data sprawl—defined as the proliferation of data into endpoints, servers, applications, BYODs, operating systems, network environments, and even other geo-servers—can be a challenge to monitor and control.

Exciting news about ServiceDesk Plus' IT asset management module

We’re delighted to announce that ServiceDesk Plus, our flagship IT service management (ITSM) solution, received PinkVERIFY 2011 certification for its IT asset management (ITAM) processes. This adds to ServiceDesk Plus’ existing PinkVERIFY certifications for its incident management, request fulfillment, and change management processes.

OpManager bags gold-listed in Feedspot's top networking blogs and sites to follow in 2019

Great news! The OpManager blog has ranked #15 in Feedspot’s top 100 networking blogs and websites to follow. This is a particularly big deal for ManageEngine as we focus on creating valuable content for IT admins, and to be recognized for that confirms we’re headed in the right direction.

Agent Smith materializes from the matrix of Android malware

There’s a new shapeshifting strain of Android malware in the mix. It replaces legitimate apps with compromised ones and is imaginatively named Agent Smith after the iconic villain in The Matrix. Yet another malware attack targeting Android—so what’s the big deal? Agent Smith is similar to other malware campaigns such as Gooligan, HummingBad, and CopyCat with respect to the destruction it can cause via fraudulent ads.

Five reasons to choose Log360, part 3: Comprehensive network auditing

In the previous post, we discussed the various environments that Log360 helps you audit and secure. Having established the ease of Log360’s use and the breadth of its auditing scope, now we’ll examine some of the critical areas it can help you monitor. With over 1,000 predefined reports and alerts for several crucial types of network activity, Log360 provides comprehensive network auditing.

Five worthy reads: Educating the education sector on cybersecurity

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we discuss the state of cybersecurity in the education sector. Making up more than 6 percent of the gross world product, the global education sector has been growing at a 4.5 percent compound annual growth rate (CAGR) and is forecasted to be worth $10 trillion by 2030.

Five reasons to choose Log360, part 2: Multi-environment support

In the previous post of this series, we looked at how easy it is to get Log360 up and running due to its various deployment features and easy-to-use UI. Today, we’ll dive into the solution’s wide range of support for event sources across multiple environments. Servers and workstations. With Log360, you can easily go deep into the events occurring on all Windows, Unix/Linux, and IBM servers and workstations in your network.