September Newsletter 2021

Please add to your address book | View online version

September 2021

Desktop Central recognized in 2021 Gartner Magic Quadrant for UEM

ManageEngine Desktop Central has been recognized by Gartner among eight vendors in the 2021 Magic Quadrant for unified endpoint management (UEM) for its ability to execute and completeness of vision.

Get access here

Introducing advanced analytics for ServiceDesk Plus Cloud

Get a holistic view of your IT—track ticket journeys, increase agent productivity, ensure compliance with service-level agreements, and more using Analytics ;Plus.

Try for free now

Are you CPRA-ready?

The California Privacy Rights Act (CPRA) goes into effect on January 1, 2023, with a lookback period for data starting January 1, 2022. Here’s all you need to know.

Find out now

[E-book] OIG’s Microsoft 365 audit checklist and how to prepare for it

Are you sure that your Microsoft 365 setup is ready for the Office of Inspector General (OIG) audit?

View the checklist

The CISA drops the 30 most exploited vulnerabilities since 2020

Buckle up, folks! Cybersecurity agencies in the US, UK, and Australia issued a joint advisory listing the most exploited vulnerabilities in 2020 and 2021. Many are years old.

Take a peek

Apple WWDC21 updates: Here’s how they impact your IT ecosystem

You can leverage new features on your iOS and iPadOS devices to improve security and simplify management if you’re update-ready.

Learn how

Moving beyond Zero Trust with continuous authentication

Verifying users only during logon creates a security gap. Bridge this gap with behavioural biometrics to strengthen your defense against security incidents.

Learn about Zero Trust

5 best practices to leverage user behavior analytics

Detect, investigate, and mitigate insider attacks by adopting these five user behavior analytics best practices to enhance your threat hunting strategies.

Learn more

AWS, Azure, and GCP—Monitoring, best practices, and more

Ensure optimal performance of applications hosted on cloud platforms like AWS, Azure, and GCP. Get best practice recommendations for all your cloud resources via Guidance Reports.

Explore more

Upcoming webinars


The Role of IAM in securing your hybrid IT environment

Sep 22, 2021

Register »

The service desk is your best technology coach

Sep 30, 2021

Register »

Fundamentals of the cloud and the first principles of securing it

Sep 30, 2021

Register »

Is your IT team ready for the hybrid work model?

  Oct 5, 2021

Register »


Top blog posts of this month


Securing endpoints: Ensuring hackers don’t manipulate your browsers


The never-ending love story between cyberattacks and healthcare


Remote work and its lasting impact: What our global research uncovered


Differential privacy—what it means for businesses

Sign up for our blog digest

©2021.ManageEngine is a trademark of Zoho Corp.

All other company and product names may be trademark of the respective companies
with which they are associated.

September Newsletter 2020

Please add to your address book | View online version

September 2020

[Infographic] Ace data security with these four fundamentals

Update your basic data security knowledge, and discover the finer points for safeguarding your business-critical data.

Back to basics

Scale your IT and gain the cloud advantage

Equip your IT team with our advanced solutions to manage, monitor, and secure your multi-cloud and hybrid IT environment.

Explore now

E-book: A definitive guide for not falling prey to ransomware

Ransomware cost businesses globally more than $75 billion last year. Learn how you can steer clear of the hefty fines, and thwart ransomware by updating your anti-ransomware strategy.

Ransomware-proof your data

E-book: Master Linux security management for your network

Not only Windows and Mac, even Linux systems can fall victim to cyberattacks. This e-book helps IT sysadmins improve their existing Linux security procedures.

Secure your Linux

Streamline your identity governance with business workflows

Trace employee access and identity changes by empowering managers to validate the requests via automated workflows.

Tell me more

Enhance your network traffic analysis with IP address management

With the new IP address management add-on in NetFlow Analyzer, our well-rounded bandwidth management tool, analyze your network’s top users and block ports with anomalous traffic.

Dive into the details

The five common mistakes of an incident response plan

The worst cyberattacks are due to the common IR mistakes made repeatedly. Review the five common mistakes of the IR plan and learn how to avoid them.

Optimize your IR plan

Active Directory account lockout best practices

Learn and implement these nine account lockout best practices to minimize disruptions in your network.

Get started now

Monitor and ensure seamless digital experience for users

Analyze, improve, and continuously test application performance by synthetic simulation on real-browsers like Chrome and Firefox, and ensure a smooth digital experience for users.

Enhance user experience

Upcoming webinars


A five-step plan for effective data protection

  Sep 22, 2020

Register »

Active Directory under attack: From zero access to domain admin in 40 minutes

  Sep 29, 2020

Register »

Identity and Access Management: A prerequisite for cybersecurity?

  Oct 13, 2020

Register »


Top blog posts of this month


How augmented data management can pave the way for better decision-making


5 tips to avoid cyberattacks on EdTech platforms


We studied how the pandemic has affected ITSM—here are the results


Promote productivity without compromising on security through role-based access control

Sign up for our blog digest

©2020.ManageEngine is a trademark of Zoho Corp.

All other company and product names may be trademark of the respective companies
with which they are associated.

September Newsletter 2019

Please add to your address book | View online version


September, 2019

Millions of mobile devices fall prey to mobile
attacks every day. How safe is your enterprise?


Leverage Mobile Device Manager Plus to proactively identify,
diagnose, and mitigate mobile threats.

Secure your devices

ManageEngine’s IT Security podcast series is here!


We are delighted to announce the launch of our weekly IT Security
podcast series; now you can listen to your favorite IT security
experts on the go!

Subscribe now

Defend against insider threats with machine
learning algorithms


Learn about the fundamentals of user and entity behavior analytics,
and discover how you can prevent sophisticated attacks.

Download white paper

[E-book] How to protect your C-suite
from whale phishing attacks


Learn the latest techniques scammers are using to attack
 C-suite mailboxes, and how to thwart them.

Prevent attacks

EMA research: The must-haves in an enterprise
 network performance management
(NPM) solution


EMA, a leading IT research firm, has released a new white paper
 covering the issues in data management and how
 OpManager helps solve those issues.

Download white paper

Effortlessly monitor your Nutanix infrastructure


Gain visibility into your hyper-converged environment, track key metrics,
and identify and resolve issues easily with support for Nutanix.

Learn more

Introducing advanced analytics for
Password Manager Pro


Analyze password security, usage patterns, and operation volumes
to gain actionable insights and fortify your privileged accounts.

Secure your accounts

Introducing Device Control Plus, the solution
 that drives data protection


Bid goodbye to data leaks via removable devices. Device Control
Plus can instantly control, block, and monitor all device
and file accesses.

Gain control

Improve the digital experience of end users
across all platforms


Ensure your application is not just available, but also fast enough
 to engage users and deliver a smooth end-user experience; you
can also monitor the experience on web and mobile platforms.

Enhance the end-user experience

Six surefire ways to protect your network from
impending privilege abuse attacks


Worried that a privilege abuse attack might be brewing? Fend
off instances of privilege abuse by implementing these
airtight measures.

Safeguard your network
Mitigating insider threats with User Behavior Analytics Sept 17, 2019 Register »
Secure, on-the-go Active Directory password self-service Sept 18, 2019 Register »
How to leverage analytics to secure your privileged accounts Sept 19, 2019 Register »
CCPA 101 for IT administrators Sept 19, 2019 Register »
Prevent identity and privilege mishaps with an effective change management strategy Sept 25, 2019 Register »
How to balance usability and security in enterprise password management Sept 27, 2019 Register »
This month’s top blog posts
AssetExplorer gains an edge over other ITAM software
User and entity behavior analytics: The intelligent guardian
of your business
Seven ways to secure macOS deployments in your enterprise
ServiceDesk Plus named in Capterra’s 20 most popular IT
asset management solutions list
Sign up for our blog digest

September Newsletter – 2018

Please add to your address book | View online version

September, 2018

Learn from the best at our
Chicago User Conference


Two days of hands-on training—now at half the price.

Claim your early bird pricing

Strengthen your first line of defense
against hackers


Don’t be a victim of common hacks like brute force, social engineering, and dictionary attacks. Learn from our expert’s guide to cybersecurity.

Up your defenses

Privileged access management practices for healthcare cyber hygiene


A PAM routine, when followed religiously, can help healthcare organizations
secure access to patient data as well as prove compliance with HIPAA regulations.

Build up your immunity

Auto-remediate your IT incidents


Learn how to automatically execute defined scripts or actions
when an alert is received in AlarmsOne.

Automate your workflow

[Free e-book] Five revenue metrics
every MSP should track


Ready for a reality check? Here are five revenue metrics to help you
see how profitable your business truly is.

Track your profits

New in Applications Manager


Track key metrics like throughput, latency, and throttled requests
right from Applications Manager.

Data on Dynamo

Take control of your network logs


Read our handbook to learn how to audit your network perimeter logs
using a SIEM solution.

No-nonsense network

Monitor your VMware
datastores from the cloud


Storage, latency, snapshot size—what other VMware vSphere
datastore metrics will you monitor?

Dig into datastores

Essential Office 365 best practices


Plug the security gaps in your Office 365 setup to safeguard against potential threats.

Secure your setup

Access management cheat sheet for making your files, folders, and shares bulletproof


Improve security and ensure regulatory compliance using a single pane for access permissions management and reporting.

Address your access

Troubleshoot from anywhere at any time


Enter Remote Access Plus, our new solution for troubleshooting
Windows, Mac, and Linux computers.
With advanced remote control and over a dozen tools,
you can quickly resolve any IT incident.

Ready to go remote?

We’re thrilled to be positioned in the first Gartner Magic Quadrant for UEM


Desktop Central was recognized for its easy-to-navigate interface
and lower price point than many other UEM vendors.

Quite the quadrant

OpManager emerges as a leader in
network monitoring


Read why Info-Tech gave OpManager a gold medal in its
Network Monitoring Category Report.

Go for gold

Flow data: How to configure and monitor it September 25, 2018 Register »
Network monitoring: Doing it the smart way September 26, 2018 Register »
Top five tips for Office 365 security and compliance September 26, 2018 Register »
This month’s top blog posts
Less is more: Role-based performance monitoring with OpManager
Industry best practices for endpoint security
Lessons from one of the first major data breaches in a post-GDPR Europe
“Ok Google, what does Android Pie have in store for enterprises?”
Five worthy reads: The “edge” is near!
Sign up for our blog digest

September Newsletter – 2017

September Newsletter – 2016

September Newsletter – 2015

September Newsletter – 2014


September 2014

Mobile Device Management (MDM) for Windows


Site24x7 enhances authentication – Joins the single sign on system of More…

Active Directory

ADAudit Plus introduces ​real-time change auditing of Windows Active Directory with 200+ reports and email alerts. More…

ADSelfService Plus: ​Dashboard gets OU filters for a much more granular overview of information. Also, end users can now crop their photos during self-update and change the default language on the login page itself. More…

ManageEngine ADSolutions welcomes AD enthusiasts to participate in a seminar-cum-workshop on real, continuous Active Directory Auditing with AD Expert Derek Melber. Join here.

Application Performance

Applications Manager introduces performance monitoring support for VMware Horizon View and its components. More…

OpStor support for EMC Avamar is currently in private beta. Sign up here to get a sneak peek.

SQLDBManager Plus now monitors the mirroring details of SQL databases augmenting the existing database and replication monitoring.


​Desktop Central now introduces remote control support for Mac Desktops, which makes remote troubleshooting really simple. More…

IT Security

White Paper: ​Are you Audit-Ready for Payment Card Industry Data Security Standard 3.0 (PCI DSS) Compliance? More…

Network Performance

Forrester ​Webinar on Sep. 30: Streamlining business services with effective data center management. Guest Speaker: Andre Kindness, Forrester Research. More…

Free Hyper V Configuration Tool lets you configure Hyper-V 2012 R2 VM resources and expand or clone the virtual hard disk remotely. More…


Oracle OpenWorld, San Francisco, CA
Sep 28 – Oct 2, 2014

​it-sa, Nuremberg, Germany
Oct 7 – 9, 2014


Video Zone

Webinar: True Continuous Auditing of Active Directory
Site24x7: Linux Server Monitoring from the Cloud
Follow us
Follow on Facebook Follow on Twitter Follow on LinkedIn Follow on Google Plus Follow on YouTube Follow on Pitstop
Share on FacebookShare on TwitterShare on LinedIn Share on Google Plus
© 2014. ManageEngine is a trademark of ZOHO Corp.
All other company and product names may be trademark of the respective companies with which they are associated.