Growing instances of information security incidents have forced IT enterprises to put an effective IT policy in place. All such policies stress three essentials, among the numerous guidelines: Usage of unique, strong passwords across all IT resources Rotating the passwords at periodic intervals Role-based access controls for IT resources Enforcing the IT policy with respect to the privileged passwords turns out to be a daunting task to carry out manually.
Microsoft Releases Advance Notification for August 2011 Patch Tuesday
Microsoft released their advance notification for August 2011 patch Tuesday. Microsoft will release 13 bulletins on August 09 , 2011 addressing 22 vulnerabilities.
Performance based IT Shop
Some companies make the insightful IT business decisions because they have the right data, processes and software. Because ManageEngine fits into the software bucket, I
Privileged password management: Protection alone is not sufficient
Privileged password management has now emerged a key aspect of IT management. With ever-increasing number of privileged identities in shared environment, protecting the administrative passwords is absolutely essential, but that alone is not sufficient
The New Face of Java EE Web Transaction Monitor
Applications Manager
Taking the Advanced Security Analytics to the next level
Our previous blog on advanced security analytics module would have given you a general idea of what ASAM does? Pre-requisites for ASAM module and more
Automated Patch Deployment is now more User Friendly
If you are already used to Automated Patch Deployment (APD) tasks, there might be few changes that you need to make a note so that you get to see the correct place for the information. You would no longer need to look under configurations for checking the status of automated patch deployments; everything is made available right under the automated patch deployment instead
Cisco WAAS Reporting in NetFlow Analyzer—Part 2
So after adding WAAS to your NetFlow Analyzer, next question is what kind of reports it can generate? This blog helps you to understand various kind of reports available in Cisco WAAS module.
NetFlow configuration for Cisco XR 12000 Series Routers
We would like to share the configuration for Cisco XR 12000 Series Routers, the NetFlow configuration for these routers is different from that of the other routers. Hence we thought of sharing this information with you.
Ensuring Network Security and Compliance using DeviceExpert
With increasing security threats to mission-critical network resources and serious legal consequences of information mis-management, enterprises everywhere are required not just to follow standard practices, internal security policies, stringent Government regulations and industrial guidelines, but also demonstrate that the policies are enforced and network devices remain compliant to the policies defined. Ensuring compliance has become a priority for network administrators nowadays.