October 2021

Please add newsletter@manageengine.com to your address book


October 2021

Are you really aware? And most importantly, are you safe?

Cybersecurity Awareness Month is here! We have a lot in store for you. Join us and test how cyber aware you really are. There are some exciting gift cards to be won, too!


Become cyber aware

We’ve been recognized in the 2021 Gartner® Magic Quadrant™ for ITSM Tools

The 2021 Gartner® Magic Quadrant™ for ITSM Tools is out now, and we’re excited to announce that Gartner has recognized ManageEngine for the second year in a row.


View a complimentary copy

NSA’s security checklist deciphered!

Check out how you can secure your business by implementing NSA’s security recommendations.


Check it out

RedXOR and Mamba: What makes modern malware dangerous?

Modern malware like RedXOR and Mamba use little known tactics to breach your IT environment. What are they and how do you avoid them?


Find out now

[E-book] How to protect Microsoft 365 from NOBELIUM’s phishing attack

Here are the techniques used by NOBELIUM in their ongoing spear phishing attack to deliver malicious payloads and ways to secure your Microsoft 365 against them.


Secure Microsoft 365

Don’t let security bugs spoil your favorite Linux flavor

Vulnerability Manager Plus now extends vulnerability management, security configuration management, automated patching, and more to all major Linux distros and applications.


Learn more!

Maximize network traffic insights with extended data storage

Introducing HighPerf, our highly scalable raw storage database that facilitates smarter analytics, faster troubleshooting, and better bandwidth management.


Dive into the details

Free sysadmin tools for everyday use

Site24x7 offers a variety of sysadmin tools like a subnet calculator, IPV6 converter, uptime checker, cron command generator, and DKIM and DMARC tools that help with your daily tasks.


Try them out today

[E-book] How ransomware attacks weaponize Active Directory

Many recent ransomware attacks have exploited Active Directory. We describe the tactics used by threat actors and explain preemptive defense measures you should adopt.


Get the guide

Upcoming webinars


Making cybersecurity effective with threat intelligence


Oct 21, 2021

Register »

Measuring the service desk’s contribution to value


Oct 26, 2021

Register »

Enhancing threat detection with user behavior analytics (UBA)

Oct 27, 2021

Register »

How ITIL 4 is mobilizing and re-pivoting organizations globally

Nov 10, 2021

Register »


Top blog posts of this month


How Kaseya fell victim to a ransomware attack


Data center operations through the eyes of AI


A kernel of truth: Linux isn’t as foolproof as we may have thought


Decentralized identity—bringing data back to its owners


Sign up for our blog digest

©2021.ManageEngine is a trademark of Zoho Corp.

All other company and product names may be trademark of the respective companies
with which they are associated.

Subscribe to newsletter

Please enter valid email id

By clicking 'SUBSCRIBE NOW', you agree to processing of personal data according to the Privacy Policy.

Note: We respect your privacy. We will never sell or share your email address with any third party.