It goes without saying – software products operating in the IT Security space should offer rock solid security. These products should be devoid of holes and vulnerabilities; otherwise, they will prove to be haven for hackers and malicious insiders
Mobile Device Management
It’s now official – Desktop Central adds support for managing iOS devices. iOS devices like iPhones, iPads, and iPod Touch running iOS 4.0 and above can now be managed using Desktop Central
Microsoft Releases Advance Notification for April 2012 Patch Tuesday
Microsoft released their advance notification for April 2012 patch Tuesday. Microsoft will release 6 bulletins on April 10 , 2012 addressing 11 vulnerabilities.
ManageEngine OpManager named as finalist in 3 categories – www.networkproductsguide.com
It is a 3 cheers moment for ManageEngine OpManager. Yes, we are happy to share with you all that Network Products Guide, industry’s technology research and advisory guide has named ManageEngine OpManager as one of the finalists for the 7th Annual 2012 Hot Companies and Best Products Awards program . OpManager is shortlisted as finalist under the following categories Network Management IT Products and Services for Enterprise (Large) IT Products and Services for Enterprise (Medium) We take this opportunity to thank the judiciary committee for shortlisting us and our customers for their continued patronage to ManageEngine
Success Story: Netherland’s Top Research University Consolidates & Streamlines Privileged Password Management Processes using Password Manager…
Wageningen UR, an institution of international repute in the sphere of Life Sciences deals with a huge collection of intellectual property, scientific literature, confidential data, research records, details about the staff and students and a host of other sensitive information. Needless to say, the IT department of Wageningen UR is tasked with the challenge of safe upkeep of disparate IT infrastructure, combating cyber-attacks, ensuring information security and network availability. Manual Password Management Processes like maintaining privileged passwords on paper in a safe proved highly inefficient and drove users to create individual password management solutions at Wageningen UR.
The Middle East Conference Update #MEUCT12
On March 7 and 8, history was written in Dubai at MEUCT12 and we are thankful to everyone who helped us write it.
Public Response to Thycotic’s Claims Against Password Manager Pro
Thycotic Software’s Secret Server (“TSS”) is a competitor to ManageEngine’s Password Manager Pro. We have learned of a document circulated by Thycotic purporting to compare TSS and PMP
March Madness is here. Will your Enterprise Network remain sane?
The annual NCAA Men’s Basketball Championship season has started and we will soon see the frenzy reaching its peak with the regional semifinals scheduled for 22nd, Thursday and 23rd, Friday of this month. March Madness causes a decrease in enterprise productivity with employees watching streaming videos (including High Definition), reading or checking game stats online. Add to this, employees updating their opinion or commenting on someone else’s through social media tools like Facebook and Twitter, and your network is bound to see a lot more madness
Launch secure, browser-based Windows RDP, SSH and Telnet sessions from Password Manager Pro
Launching remote login sessions: Ease of use Vs Security Organizations are deploying privileged password management solutions to mitigate cyber threats and control access to sensitive IT resources. Access requirements themselves are changing in response to evolving business demands such as partners and contractors requiring remote access to internal resources. In turn, IT is seeking solutions that are secure, easy to use and let end users launch a remote login session with a single click, regardless of the target system type or authentication method and, at times, without disclosing the passwords.
Tracking Workstation Logon/Logoff using ADAudit Plus
Before getting into the specifics, I would like to give a small introduction on tracking Logon / Logoff in Active Directory environment, which is a cumbersome process. Auditing the Windows Active Directory environment Logon Auditing With the current Windows architecture it’s difficult to get all logon data at a single point