December 2019

Please add to your address book

December 2019

Mumbai UserConf ’20: Learn from the experts
behind the tools you love

Join us at our first ever user conference in India for two days of
hands-on training, one-on-one sessions, and tons of fun.


Claim your early-bird pricing

A single stolen identity can bankrupt
your company

Companies can lose as much as $4 million due to bad identity
and access management (IAM) practices. Here’s how you can
avoid taking a hit like this by rethinking your IAM strategy.


Secure identities

Will cyber terrorism bring down
your organization?

Cyber terrorists can easily carry out attacks such as
credential stuffing or password spraying, which can
prove catastrophic if successful.


Avoid disaster

Why choose between security, simplified
identity, and privilege management
when you can have them all?

Here are five simple hacks that will guarantee error-free,
secure, and swift management of identities and access rights.


Show me

A white paper: Windows 10 migration and
combating its impact on browsers

Read our white paper to find out how Windows 10 migration
can affect the browsing experience for end users, and what
you can do to ensure a seamless transition.


Brace yourself

Free support for Windows 7
Extended Security Updates (ESU)

Eliminate the hassle of deploying Windows 7 ESU using
ManageEngine’s patch management solutions.
Subscribe to learn more!


Subscribe now!

Achieving optimal Android security in your enterprise the CIS Benchmarks way!

Learn about the twenty most enterprise-critical CIS Android
Benchmarks, and how Mobile Device Manager Plus can
help you easily achieve these on your corporate devices.


Learn more

2019: A look back

New monitoring capabilities, integrations, and a smarter iOS
app, plus 17 exclusive seminars and attendance at 18 industry
events–Site24x7 has had a busy year! Take a look at our
year-end review to catch up on anything you may have missed.


2019: Year in review!

Are your network devices safe?

Detect devices in your network running vulnerable firmware,
and see ways to protect your network from imminent attacks.


Tell me more

Upcoming webinars


Limit Active Directory attack radius with efficient management practices


Dec 18, 2019

Register »

Why poor IAM could easily cost your organization as much as $4 million, and how to prevent it


Dec 18, 2019

Register »

Unlock the secrets to user logon auditing and prevent attacks


Dec 19, 2019

Register »


Top blog posts


G2 recognizes ManageEngine as a High Performer and Momentum Leader in UEM


ManageEngine recognized as best cloud security vendor


Cleaning up inactive user accounts in Active Directory


Sign up for our blog digest


©2019.ManageEngine is a trademark of Zoho Corp.

All other company and product names may be trademark of the respective companies
with which they are associated.

November 2019

Please add to your address book

November 2019

PAM360 joins our well-rounded suite
for enterprise IT

Transform your security posture with powerful privileged access governance,
approval workflows with granular controls, advanced analytics, and contextual
integrations with various IT services.


The name says it all

Another year in the Gartner Magic Quadrant
for UEM

Desktop Central was recognized for its strong set of client management
functions, which help ensure that the migration to UEM doesn’t come
at the cost of key PC life cycle management features.


Gartner says…

Release Management reaches cloud
service desks

Multiple IT releases in the same week? No problem! Easily stay on top of
all your organization’s IT releases with the Release Management module.
Build, test, and deliver IT releases with minimal risks and greater transparency.


To seamless IT releases!

The conundrum of granting admin privileges
to top-level executives

Find out the top three reasons why IT teams should think twice before
giving C-suite executives privileged access to their IT environment.


The right rights

How to purge duplicate files and
reduce storage clutter

Optimize storage space by finding and deleting duplicate files in your
Windows file server environments with DataSecurity Plus.


No more duplicates

New in RecoveryManager Plus: SharePoint
Online and OneDrive for Business backup

Back up and restore important data from your Office 365 services, including
mailbox items, SharePoint Online sites, and OneDrive for Business files.


New for O365

Centralized configuration management?
Yes please!

Manage network configurations in distributed networks with the
new Network Configuration Manager Enterprise edition.


See what’s new

Untangling Hadoop clusters

Get a comprehensive overview, set alerts, and auto-resolve issues that
arise in your Hadoop clusters. Ensure jobs don’t fail and your
production clusters are always up and running.


Start collecting

Upcoming webinars


Secure logons with two-factor authentication


Nov 19, 2019

Register »

Tackle tricky application performance challenges with ease


Nov 20, 2019

Register »

Mitigating cyberthreats in 2020: A unified approach to endpoint security


Nov 21, 2019

Register »

How to implement continuous service improvement in your help desk


Dec 12, 2019

Register »


Top blog posts


A catastrophic flaw in Linux sudo command with a simple fix using Desktop Central


Yet another Exchange Online incident: All about EX191574


Secure newly created user accounts with random passwords


Sign up for our blog digest


©2019.ManageEngine is a trademark of Zoho Corp.

All other company and product names may be trademark of the respective companies
with which they are associated.

October 2019

Please add to your address book


October 2019

ServiceDesk Plus announces rapid-start Enterprise
Service Management


Swiftly create and deploy unique service desk instances for business
teams like HR, facilities, and finance within 60 seconds with the
on-premises version of ServiceDesk Plus.

Up your game

Free e-book: Unified Endpoint Management
(UEM) for Dummies


Discover the importance of UEM, and explore simplified management,
robust security strategies, and precise data management protocols.

UEM made easy

Detect copied files and prevent data leaks
using DataSecurity Plus


Learn how to track, alert, and respond to critical files being copied
across your organization with DataSecurity Plus.

Plug the leaks

White paper: Group Policy change monitoring by
Microsoft MVP Derek Melber


Read about Group Policy auditing with Microsoft as well as solutions
that can help you fill in the gaps left by native auditing tools.

A word from the wise

Free e-book: A guide to implementing analytics in IT


Implementing analytics for IT is no small feat. To make it easier, we’ve
compiled an e-book that outlines the steps involved in implementing
IT analytics.

Become an expert

VMware resource pool monitoring added by
popular demand


Take control of your VMware environment. Understand resource
allocation and avoid virtualization bottlenecks in minutes.

Plan ahead

Unravel the path to seamless Oracle Cloud


Gain complete visibility into your Oracle Cloud infrastructure, and track
key metrics such as block volumes, boot volumes, and network traffic.

Oversee Oracle

How cybersecure are you?


Hackers and viruses are finding new ways to enter your cyberspace.
Take the cybersecurity quiz to see where you stand, and learn best
practices to keep you and your organization safe from attackers.

Quiz me
Improve Active Directory security with advanced password policy controls and MFA Oct. 16, 2019 Register »
Virtual seminar – Active Directory & IT Security Oct. 16, 2019 Register »
How to implement continuous service improvement in your help desk Oct. 17, 2019 Register »
Incident detection and response with SIEM Oct. 22, 2019 Register »
Shortcuts to enhance AD security and ace compliance audits Oct. 23,2019 Register »
Unmonitored permissions and unchecked privileged access – an invitation for a security breach Oct. 29, 2019 Register »
Don’t let security misconceptions put your business at risk Nov. 7, 2019 Register »
This month’s top blog posts
The Joker’s in town. Time to secure your Android devices
Five worthy reads: Infrastructure as Code, the single source of truth
NTLM vulnerabilities that make you susceptible to relay attacks
ManageEngine’s first User Conference in Canada delivers plenty
of product training and fun
Sign up for our blog digest

September 2019

Please add to your address book


September, 2019

Millions of mobile devices fall prey to mobile
attacks every day. How safe is your enterprise?


Leverage Mobile Device Manager Plus to proactively identify,
diagnose, and mitigate mobile threats.

Secure your devices

ManageEngine’s IT Security podcast series is here!


We are delighted to announce the launch of our weekly IT Security
podcast series; now you can listen to your favorite IT security
experts on the go!

Subscribe now

Defend against insider threats with machine
learning algorithms


Learn about the fundamentals of user and entity behavior analytics,
and discover how you can prevent sophisticated attacks.

Download white paper

[E-book] How to protect your C-suite
from whale phishing attacks


Learn the latest techniques scammers are using to attack
C-suite mailboxes, and how to thwart them.

Prevent attacks

EMA research: The must-haves in an enterprise
network performance management
(NPM) solution


EMA, a leading IT research firm, has released a new white paper
covering the issues in data management and how
OpManager helps solve those issues.

Download white paper

Effortlessly monitor your Nutanix infrastructure


Gain visibility into your hyper-converged environment, track key metrics,
and identify and resolve issues easily with support for Nutanix.

Learn more

Introducing advanced analytics for
Password Manager Pro


Analyze password security, usage patterns, and operation volumes
to gain actionable insights and fortify your privileged accounts.

Secure your accounts

Introducing Device Control Plus, the solution
that drives data protection


Bid goodbye to data leaks via removable devices. Device Control
Plus can instantly control, block, and monitor all device
and file accesses.

Gain control

Improve the digital experience of end users
across all platforms


Ensure your application is not just available, but also fast enough
to engage users and deliver a smooth end-user experience; you
can also monitor the experience on web and mobile platforms.

Enhance the end-user experience

Six surefire ways to protect your network from
impending privilege abuse attacks


Worried that a privilege abuse attack might be brewing? Fend
off instances of privilege abuse by implementing these
airtight measures.

Safeguard your network
Mitigating insider threats with User Behavior Analytics Sept 17, 2019 Register »
Secure, on-the-go Active Directory password self-service Sept 18, 2019 Register »
How to leverage analytics to secure your privileged accounts Sept 19, 2019 Register »
CCPA 101 for IT administrators Sept 19, 2019 Register »
Prevent identity and privilege mishaps with an effective change management strategy Sept 25, 2019 Register »
How to balance usability and security in enterprise password management Sept 27, 2019 Register »
This month’s top blog posts
AssetExplorer gains an edge over other ITAM software
User and entity behavior analytics: The intelligent guardian
of your business
Seven ways to secure macOS deployments in your enterprise
ServiceDesk Plus named in Capterra’s 20 most popular IT
asset management solutions list
Sign up for our blog digest

August 2019

Please add to your address book


August, 2019

Introducing Zia, the AI-powered analytics
assistant for ITSM


You don’t have to be an analytics expert to gain insights from
your data. Just ask or type a question, and Zia will instantly
respond with rich visualizations.

Analytics meets AI

Maximize application performance in the
AWS cloud


Centralize metrics and log data from over 30 AWS resources and application
components for faster troubleshooting and analysis.

Get insights

E-book: Your hybrid identity management mistakes
are crippling your organization


Learn how to overcome your hybrid identity management challenges,
protect your organization from productivity losses,
and prevent massive data breaches.

Read the e-book

Free guide: SQL Server auditing made easy


Check out our comprehensive guide on how to easily
and efficiently audit SQL servers.

Audit SQL servers

New in OpManager—monitor HPE Nimble, Pure
Storage, and Dell Compellent storages


Check for availability, track utilization, and gain a deeper understanding
of storage environments using OpManager.

Learn more

A change management toolkit to avoid
identity and privilege mishaps


ADManager Plus—the secret sauce to spot and stop unauthorized
changes to privileged accounts and critical resources.

Amp up IT security

E-book: Does your password management
need an upgrade?


Forrester Research estimates that each password reset call costs $70.
Are you willing to spend thousands at the cost of your users’ forgetfulness?

Reduce your costs

Three days of hands-on training and immense fun
at our first-ever User Conference in Canada


Here’s your last chance to claim the tickets at half off.

Register now
Active Directory and IT security webinar series August 20, 2019 Register »
Everything you need to know for efficient AD adminstration August 27, 2019 Register »
Ensure your application monitoring game is on point! August 28, 2019 Register »
Keeping up with compliance regulations: The GDPR, CCPA, and beyond August 28, 2019 Register »
An expert’s checklist to troubleshoot account lockout August 29, 2019 Register »
Manage your network device configurations efficiently and automate network tasks September 3, 2019 Register »
This month’s top blog posts
What is Windows 10 migration, and how do you implement
Windows 7 to Windows 10 migration?
Agent Smith materializes from the matrix of Android malware
Exciting news about ServiceDesk Plus’ IT asset management module
Five worthy reads: Educating the education sector on cybersecurity
Sign up for our blog digest

July 2019

Please add to your address book

July, 2019

Celebrating the champions of IT


This SysAdmin Day, enjoy a quick game of Downtime Dash, show
your appreciation by sending e-cards to your fellow sysadmins,
and compete for a chance to win some cool prizes.

Celebrate with us

“AD360, a good solution for AD-centered
SMBs”  – KuppingerCole


Respected IT and Information Security Analyst Martin Kuppinger shares
how AD360 can add depth to your identity and access management
with user life cycle automation.

An expert opinion

What is junk data costing your organization?


Stale files take up an average of 33 percent of an organization’s total
storage. Learn how much you can save by clearing out stale data.

View the infographic

E-book: Simplify Office 365 identity management
with life cycle orchestration


Improve IT efficiency using event-driven Office 365 user life cycle
automation through customized condition-based flowcharts.

Create your automation

White paper: Load testing essentials for
a sound business continuity plan


Three must-have fail-safe mechanisms to reduce downtime
and improve protection against data disasters with Active
Directory backup and recovery.

Done with downtime

Site24x7 + Azure Deployment
Manager = Safer deployments


Monitor the health of your services and ensure
only effective, relevant updates are deployed.

Time for a checkup

Advanced analytics for ServiceDesk
Plus asset management


Optimize asset utilization, make better purchase decisions, and
reduce IT costs with advanced analytics for asset management.

Get insights now

Gather real-time stats for AWS Elastic
Load Balancing (ELB)


Monitor application load balancers, analyze traffic patterns, and
easily resolve load balancer issues with Applications Manager.

Take a load off

OpManager now integrates with Slack


With the new Slack-OpManager integration, receive real-time alerts,
discuss troubleshooting steps with peers, make quick decisions,
and avoid possible downtime.

Support for Slack

Introducing a brand-new OS Deployer


OS Deployer has a new look, fresh features, and advanced
techniques for easy OS imaging and deployment.

Check it out

Join us in Toronto for our first-ever
User Conference in Canada


Don’t miss your chance to catch live demos, hands-on training,
one-on-one sessions with experts, networking opportunities,
and more.Tickets now available at half off.

Claim your early-bird tickets

One year of the GDPR: A look back


The GDPR, one of the strictest privacy laws to date, has
strengthened data privacy regulations across every
industry. We’ve uncovered some fascinating
statistics about its first year.

In retrospect
ServiceDesk Plus’ Masterclass Webinar Series July 17, 2019 Register »
Monitor your network performance and network maps July 17, 2019 Register »
Protect your network from threats: Optimize firewall performance July 23, 2019 Register »
Improve Active Directory security with advanced password policy controls and MFA July 23, 2019 Register »
SIEM for beginners July 25, 2019 Register »
Save big with advanced analytics for ServiceDesk Plus asset management July 25, 2019 Register »
This month’s top blog posts
Microsoft Patch Tuesday June 2019: 88 vulnerabilities to fix, but how?
Helping IT admins tackle commonly encountered web application issues
Five worthy reads: Fend off cyberattacks using dark web intelligence
Five worthy reads: Should NoOps be your new operations strategy?
Sign up for our blog digest

June 2019

Please add to your address book

June, 2019

E-book: Understanding web browser security


Find out how to protect your enterprise from
browser-based cyberattacks.

Bolster those browsers

Free comic: Three tales of the GDPR


The world of the GDPR like you’ve never seen it before.

Read the comic

See how Firewall Analyzer simplifies
firewall management


Balancing firewall speed and network security can be a daunting task
for security admins. But Firewall Analyzer makes it easy.

Watch and learn

Achieve end-to-end Kubernetes monitoring


With support for Kubernetes, you can now visualize your entire
container infrastructure, and ensure that your deployed
applications are running optimally.

Get a sneak peek

ManageEngine recognized as a Gartner Peer
Insights Customers’ Choice once again


See why we’re a May 2019 Gartner Peer Insights Customers’ Choice
for Network Performance Monitoring and Diagnostics Software.

From our customers

E-book: Think passwords are going
anywhere? Think again


Learn the top three reasons passwords are here to stay and best practices
for password management that help facilitate productivity.

Why passwords matter

New endpoint detection and response (EDR)
feature ready for beta testing


Join our private beta and learn how to detect, disrupt, and prevent
sensitive data leaks via endpoints using DataSecurity Plus.

Get early access

Are unauthorized changes and accidental
deletions hindering your security efforts?


Arm your environment against accidental deletions or disasters, and
bring your system back to its original state when things go wrong.

A smooth recovery

E-book: The US Department of Homeland
Security’s Office 365 security best practices


Read about configuration vulnerabilities identified by the
Cybersecurity and Infrastructure Security Agency, and the
best practices to mitigate these risks.

What the experts recommend
Secure Windows logons with two-factor authentication (2FA) June 19, 2019 Register »
The US Department of Homeland Security’s Office 365 security best practices June 20, 2019 Register »
Top five password management features that enable better IT security and efficiency June 25, 2019 Register »
Deliver next-level customer support using advanced analytics for your service desk June 27, 2019 Register »
Accelerating threat detection and response with UEBA June 27, 2019 Register »
This month’s top blog posts
BlueKeep ‘wormable’ vulnerability—the next WannaCry?
Five worthy reads: The rising notoriety of Ransomware-as-a-Service (RaaS)
Introducing ServiceDesk Plus Cloud for Microsoft Teams
Sign up for our blog digest

May 2019

Please add to your address book

May, 2019

Take charge of your business workflows
and facilitate effortless communication
between your organizational teams


Whether it’s technical support or software development, Orchestly helps you
optimize your business processes. It acts as the command center by bringing all
the information and tools you need to manage workflows onto one platform.

Orchestrate your workflows

ServiceDesk Plus introduces its very
own virtual support agent


Zia, Zoho’s virtual support agent, is now available in the cloud version of
ServiceDesk Plus, giving service desk teams the opportunity to improve their
response rates and productivity, and achieve greater customer satisfaction.

Meet Zia

ManageEngine named an April 2019
Gartner Peer Insights Customers’ Choice


OpManager helps ManageEngine receive recognition as an April 2019 Gartner
Peer Insights Customers’ Choice for IT Infrastructure Monitoring Tools.

What customers are saying

E-book: Six ways analytics can facilitate proactive IT operations management


Proactive IT operations management can help you anticipate problems and
troubleshoot blind spots to better serve end users. In this e-book, you’ll learn
six ways analytics can help you proactively manage IT operations.

Grab your copy now

Five tell-tale signs that you’re heading
for a compliance violation


Want to get a clean bill of health from IT regulatory bodies? Keep an eye out
for these five red flags in your network to avoid compliance mishaps.

Learn how

Applications Manager now supports
Network Policy Server (RADIUS server)


You can now monitor critical metrics for your RADIUS servers, like their
availability, CPU usage, and the number of authentication
requests per second.

Dive into the details

ManageEngine has been named a 2019 Gartner Peer Insights Customers’ Choice
for Unified Endpoint Management (UEM)


Customer satisfaction is at the heart of everything we do. Our users are our
biggest and most vocal advocates, and what they say about Desktop
Central is fantastic!

Why they love us

E-book: Five steps to remediate your compromised Office 365 account


Minimize the damage from account compromise in your Office 365 setup by
learning how to quickly identify the security risks and fix the
compromised account.

Manage the damage

Mitigate malicious logins, privilege abuse,
data breaches, and more


Leverage machine learning and statistical analytics to analyze user behavior
and secure your Windows Server infrastructure.

Get started now

Meet your new IT assistant, Zia


Manage endpoints hands-free while you’re on your way to work, getting ready
to hit the hay, out running an errand, or even when you’re just
being a couch potato.

Learn how!

Monitor the performance of single-page applications (SPAs)


Monitor SPAs built in AngularJS, Ember.js, React, Backbone.js, and other
frameworks using Site24x7 real user monitoring (RUM). Track route changes
and AJAX calls, and optimize the end-user experience.

Start monitoring

The key to seamless database performance monitoring May 22, 2019 Register »
SIEM best practices and use cases May 22, 2019 Register »
Busting the analytics myth: Can analytics really help you improve help desk processes? May 23, 2019 Register »
Learn how to manage network configurations and prevent network disasters May 28, 2019 Register »
Five everyday challenges in identity management and how to sail through them May 28, 2019 Register »
Active Directory password self-service for Windows, macOS, and Linux systems May 29, 2019 Register »
This month’s top blog posts

Rule impact analysis: A new dawn of firewall policy planning
Five worthy reads: Wrapping security into every aspect of DevOps
Brick and mortar meets mobile: Combining the best of both worlds
Sign up for our blog digest

April 2019

Please add to your address book

April, 2019

ManageEngine recognized in Gartner’s
MQ for NPMD two years in a row


Gartner has taken note of OpManager’s newly added
features driven by customer feedback.

Inside the MQ

We’re a 2019 Gartner Peer Insights
Customers’ Choice for Privileged
Access Management


Our customers have spoken. Password Manager Pro is now one of the
top choices of IT security professionals for protecting their privileged
accounts and controlling administrative access.

The inside scoop

Another MQ appearance for ManageEngine: APM


We’re honored to be featured yet again in Gartner’s Magic Quadrant for Application Performance Monitoring.

Dive into the details

Take a crack at our password guessing game


You may be surprised by how easy it is to guess common passwords.

Start guessing!

Observe, monitor, and optimize AWS costs


Gain better visibility into how much your business is spending on AWS, see
running costs for the past six months, evaluate monthly spending, identify
the three most costly services, and more.

Control your costs

Busted: Three identity management myths


Meet IT administrators Mark and Sarah. While Mark believes that conventional
user account management practices still hold up, Sarah begs to differ.
What do you think?

Move past the myths

ML-powered analytics to identify user and entity behavior anomalies


Log360 adds new capabilities including score-based risk assessment, threat
corroboration, and anomaly detection.

See UEBA in action

[Free e-book] Detecting Office 365 service health


Frustrated with Office 365 service outages? Learn how to receive instant
notifications to ensure faster downtime resolution.

Fix outages now

[Free guide] Twelve best practices for
effective patch management


Patching is a fundamental part of endpoint management. Ensure it’s
done the right way!

Patch the best way

Key Manager Plus scales up PKI automation


Leverage our integration with The SSL StoreTM to request, acquire, renew, and track certificates from multiple public CAs from a single pane of glass.

The best of both worlds

Dallas UserConf: Three days, additional
tracks, and more fun


Don’t miss your chance to catch live demos, one-on-one sessions with
experts, networking opportunities, and more.

Grab your seats
Learn the gray areas of privacy compliance from the viral Monopoly Man April 16, 2019 Register »
Protect your network from threats: Optimize firewall performance April 23, 2019 Register »
How to shield telecommuters from password troubles and ensure business continuity April 24, 2019 Register »
How analytics for change management processes can save you millions April 25, 2019 Register »
Top 5 IT security red flags that indicate you’re vulnerable to insider threats May 2, 2019 Register »
How to detect insider threats and account compromise in Office 365 April 25, 2019 Register »
Accelerating threat detection and response with UEBA May 2, 2019 Register »
This month’s top blog posts

The what, why, and how of unified endpoint management
New integration offers a consolidated look at your APM alerts
Here comes the California Consumer Privacy Act, an echo of the GDPR
Sign up for our blog digest

March 2019

Please add to your address book

March, 2019

Dallas UserConf ’19: Learn from the people behind the tools you love


Three days of hands-on training, one-on-one sessions,
and immense fun.

Claim your early-bird pricing

Amp up your cybersecurity game with ManageEngine’s all-new Vulnerability Manager Plus


Vulnerability Manager Plus is an enterprise solution that hunts down vulnerabilities, misconfigurations, and security loopholes in your network, while keeping your systems and servers secure.

Try it for free

New cloud identity solution for enterprises


All-new Identity Manager Plus offers cloud-based single sign-on for Office 365, G Suite, Salesforce, and other enterprise applications.

Get exclusive access

ServiceDesk Plus Cloud introduces a CMDB
in its enterprise edition


ServiceDesk Plus Cloud now provides a CMDB. Service desks can define CIs, track their relationships, and gain greater control.

Click to explore

E-book | Choosing the right chart for your IT data


With so many chart types available, choosing the right charts to study your IT data can be confusing. In this e-book, we’ve picked nine charts and outlined how you can use them effectively to get insight into your IT data.

Download e-book now

10 crucial security audit reports every admin needs


Read our e-book to access audit reports and track crucial security events, such as user logons and data accesses.

Events you need to track

Detect security threats by tracking Active Directory user login history


Get a consolidated login trail of users and leverage machine learning to analyze login patterns.

Show me how

How do I achieve and sustain enterprise IT security?


That’s the question most IT admins have asked themselves at some point. Our free e-book has the answer.

Safety first!

E-book | The Basics of Network Monitoring


Revisit the fundamentals of network monitoring and best practices to improve your network’s performance.

Get your free copy

Who knew Identity Management could
be so much fun?


Don’t believe us? See for yourself how managing user identities can be like playing a game. You can tackle onboarding, managing, off boarding, and a whole lot more across AD, Office 365, G Suite, etc.

Play the game
Secure Windows logons with two-factor authentication (TFA) March 27, 2019 Register »
Safeguard your network from intruders — OpUtils free training March 27, 2019 Register »
Free OpManager online training April 3, 2019 Register »
Building the threat intelligence capabilities of your organization April 9, 2019 Register »
This month’s top blog posts
Microsoft Patch Tuesday updates for February 2019
Five Worthy Reads: AI and ML:
Keys to the next layer of endpoint protection
Five Worthy Reads: The business benefits of serverless computing
Five Worthy Reads: Augmented analytics paves the way
Application Manager recognized as
2019 Gartner Peer Insights Customers’ Choice
Sign up for our blog digest

February 2019

Please add to your address book

February, 2019

E-book: Seven reasons your help desk needs analytics


Create custom metrics. Perform investigative analysis. The reasons don’t stop there.

Dig deep

Gain visibility on every layer of your app stack with 50+ plug-ins


Keep tabs on the subsystems in your application platform to optimize your server monitoring experience. Gather custom metrics from MySQL, Apache, NGINX, and Nagios, or build your own plug-in.

Unveil hidden layers

Top IT security risks that you need to address ASAP


Unmanaged privileged accounts can amplify security threats and leave your organization vulnerable to privilege abuse attacks. Use Password Manager Pro to mitigate password-related security risks.

Monitor privileged accounts

What makes Patch Manager Plus a secure solution for enterprise patching?


Learn what goes into the security hardening of our patch management software.

Patch the secure way

Best ways to map the business impact of application performance issues


This e-book will walk you through the challenges you might face during application monitoring, their impact on your business, and how you can overcome them effectively.

Show me how

E-book: Top 10 tips to protect your company’s data from malicious insiders


Learn how to prevent security breaches perpetrated by ignorant, negligent, or malicious employees.

Look within

AD password caches troubling your telecommuters?


Never let forgotten passwords get in the way of your telecommuters’ work. Empower them to reset their passwords by themselves, even when on the move.

Watch and learn

Find and investigate malicious emails in Office 365


Go beyond keyword-based content searches. Ensure complete protection of personally identifiable information and confidential business data with pattern-based searches, custom search schedules, and more.

Start searching
Making IT more efficient with password sync and single sign-on February 20, 2019 Register »
How to manage IT projects like a pro using analytics February 21, 2019 Register »
Stay ahead with SIEM: Beat rampant threats in 2019 February 26, 2019 Register »
Break free of application performance barriers February 27, 2019 Register »
Securing critical business data with a comprehensive Office 365 mailbox content search February 28, 2019 Register »
The changing role of ITSM in 2019 March 5, 2019 Register »
Monitoring Active Directory: How thinking from an attacker’s perspective helps March 7, 2019 Register »
This month’s top blog posts

A year of Meltdown and Spectre: Questions that still remain
ManageEngine recognized in Gartner Magic Quadrant for
Security Information and Event Management three years in a row
Five worthy reads: The role of workforce preparedness in digital transformation
KPIs to monitor for optimal SQL Server performance
Six reasons why data backups are crucial for your business
Sign up for our blog digest

January 2019

Please add to your address book

january, 2019

ServiceDesk Plus introduces its long-awaited
Request Life Cycle feature


Service desk technicians can design the complete life cycle of requests, including statuses and transitional actions, using a drag-and-drop canvas.

Ready for RLC

Site24x7 introduces cloud-based performance monitoring for Node.js applications


Monitor and optimize the performance of all events and I/O operations in your Node.js applications for a better user experience.

A nod to Node.js

ManageEngine positioned in Gartner’s first-ever Magic Quadrant for PAM


Read the report to learn why ManageEngine was recognized and gain insight into the latest privileged access management trends.

Picks for PAM

Free e-book: 11 best practices to save your business from network pitfalls


These tried and tested network administration practices will help keep downtime at bay.

Done with downtime

Cybersecurity quiz: Your chance to win a $100 Amazon gift card


Remember when Meltdown and Spectre shook the IT industry in 2018? Here’s a quiz to test your cyber awareness, especially your knowledge of these processor flaws.

Quiz me

Infographic: 10 best practices to enrich your cybersecurity in 2019


AI, blockchain, and IoT will challenge IT departments in 2019. Here are some best practices to fortify your defenses.

Prepare for 2019

ManageEngine Log360 placed in Gartner MQ for SIEM, 2018


For the third year in a row, ManageEngine has been recognized in Gartner’s Magic Quadrant for Security Information and Event Management.

Read the report

Active Directory security: Multiple threats, one solution


Secure your AD infrastructure with ADAudit Plus’ real-time change auditing and user behavior analytics (UBA) capabilities.

Click to explore

Free e-book: Five steps to increase your Office 365 Secure Score in 24 hours


Hackers are ready with their next big plan for 2019. Protect your Office 365 setup by implementing these security best practices.

Raise your score

Five signs you need to automate your IAM process


If you spot any of these symptoms that indicate gaps in your IAM strategy, then it’s time to make your IAM operations hands-free.

Make things easier
Gain insights on real-time performance monitoring for an efficient network January 16, 2019 Register »
How to defend your Office 365 setup with a higher Secure Score January 23, 2019 Register »
Protect your network from threats: Optimize firewall performance January 29, 2019 Register »
This month’s top blog posts
IT in 2018: A ManageEngine retrospective
Preventing the SQLite Magellan vulnerability
from damaging your applications
AWS monitoring 101: Metrics to watch out for
Secure your browser against these 5 threats
Sign up for our blog digest

Subscribe to newsletter

Please enter valid email id

By clicking 'SUBSCRIBE NOW', you agree to processing of personal data according to the Privacy Policy.

Note: We respect your privacy. We will never sell or share your email address with any third party.