Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Key metrics for Elasticsearch performance monitoring

Elasticsearch is a highly scalable, distributed, open-source RESTful search and analytics engine that offers log analytics, real-time application monitoring, click stream analytics, and more. Elasticsearch stores and retrieves data structures in real time. It has multi-tenant capabilities with an HTTP web interface, presents data in the form of structured JSON documents, makes full-text search accessible via RESTful API, and maintains web clients for languages like PHP, Ruby, .Net, and Java.

Simplifying security auditing, part 6: Compliance and the cloud

In part 5, we looked at auditing your network device logs. A decade ago, security professionals were primarily concerned about network perimeter and endpoint security. While those concerns are still valid, technological advancements have created new scenarios that need to be addressed.

Are your IT management practices IoT-ready?

2017 was supposed to be the year of the Internet of Things (IoT)—the year that this highly-touted technology matured and started producing tangible results for organizations. However, the last 12 months have left advocates of IoT frustrated. A report from Cisco claims that close to 75 percent of all IoT projects fail, and IoT as a buzzword has been replaced by the likes of artificial intelligence and blockchain. This disheartening news paints a grim picture for IoT.

Simplifying security auditing, part 5: Detecting network attacks

Anyone trying to access resources in your network needs to interact with your network devices: firewalls, routers, switches, and IDS/IPSs. Each of these devices generate syslogs that contain important security information and must be audited to gain complete visibility into the activities occurring in your network. Most SIEM solutions, including our own Log360, can collect and analyze syslogs in real time and instantly alert security teams if any security event of interest occurs.

ManageEngine Strengthens Endpoint Security with the Launch of Browser Security Plus at London User Conference

LONDON - Sept. 18, 2018 - ManageEngine, the real-time IT management company, today announced its launch of Browser Security Plus, a browser management solution that helps organisations secure their corporate data in the cloud and protect their networks from web-based cyberattacks. Available immediately, Browser Security Plus provides organisations with a layer of management capabilities for browsers and their add-ons to maintain robust enterprise security.

Simplifying security auditing, Part 4: Securing web servers

Web servers are front-end facing applications that are vital for the daily operations of businesses. They are subject to attacks such as SQL injection, malicious URL requests, and the age-old classic, denial of service (DoS) attacks. While there are specialized web application security solutions that you can (and should) deploy, auditing web server logs is just as important for ensuring your web servers are secure and always up and running.

Tackling the top four challenges of Azure SQL Database monitoring

With large enterprises increasing their focus on public cloud providers, Microsoft Azure continues to have a strong foothold in the hybrid cloud industry. Azure adoption increased a whopping 11 percent last year from 34 to 45 percent, reveals the latest survey by RightScale.

Simplifying security auditing, Part 3: Keeping insider threats in check

Insider threats are on the rise. In fact, both administrators and average employees are among the biggest security threats in an organization. When it comes to security auditing, there are two areas you need to focus on: Active Directory changes and individual user activity, particularly administrator activity.

Simplifying security auditing, Part 2: Auditing systems that store sensitive data

In part 1, we looked at an overview of auditing servers. In this blog, we’ll discuss which events you need to audit in your databases and file servers where sensitive data is stored. New data protection regulations and large-scale global attacks have made this more important than ever before. The main goal is to not only ensure that the accesses and modifications to sensitive data in your network are authorized, but also that file and column integrity are maintained.

Auto-remediate your IT incidents using scripts

It’s 2am. You receive a notification from your monitoring tool. A host server ran out of space and your system is down. Now you need to get out of bed and clear the log files of whatever service has filled up your available disk space. Ugh. Now, imagine that an automated action is triggered, the log files are cleared, and your system is up and running again without requiring a single thing from you. Sounds cool, right?