September Newsletter 2021

Please add newsletter@manageengine.com to your address book | View online version

 
Newsletter
September 2021
 
 

Desktop Central recognized in 2021 Gartner Magic Quadrant for UEM

ManageEngine Desktop Central has been recognized by Gartner among eight vendors in the 2021 Magic Quadrant for unified endpoint management (UEM) for its ability to execute and completeness of vision.

 
Get access here
 
 
 

Introducing advanced analytics for ServiceDesk Plus Cloud

Get a holistic view of your IT—track ticket journeys, increase agent productivity, ensure compliance with service-level agreements, and more using Analytics ;Plus.

 
Try for free now
 
 
 

Are you CPRA-ready?

The California Privacy Rights Act (CPRA) goes into effect on January 1, 2023, with a lookback period for data starting January 1, 2022. Here’s all you need to know.

 
Find out now
 
 
 

[E-book] OIG’s Microsoft 365 audit checklist and how to prepare for it

Are you sure that your Microsoft 365 setup is ready for the Office of Inspector General (OIG) audit?

 
View the checklist
 
 
 

The CISA drops the 30 most exploited vulnerabilities since 2020

Buckle up, folks! Cybersecurity agencies in the US, UK, and Australia issued a joint advisory listing the most exploited vulnerabilities in 2020 and 2021. Many are years old.

 
Take a peek
 
 
 

Apple WWDC21 updates: Here’s how they impact your IT ecosystem

You can leverage new features on your iOS and iPadOS devices to improve security and simplify management if you’re update-ready.

 
Learn how
 
 
 

Moving beyond Zero Trust with continuous authentication

Verifying users only during logon creates a security gap. Bridge this gap with behavioural biometrics to strengthen your defense against security incidents.

 
Learn about Zero Trust
 
 
 

5 best practices to leverage user behavior analytics

Detect, investigate, and mitigate insider attacks by adopting these five user behavior analytics best practices to enhance your threat hunting strategies.

 
Learn more
 
 
 

AWS, Azure, and GCP—Monitoring, best practices, and more

Ensure optimal performance of applications hosted on cloud platforms like AWS, Azure, and GCP. Get best practice recommendations for all your cloud resources via Guidance Reports.

 
Explore more
 

Upcoming webinars

 

The Role of IAM in securing your hybrid IT environment

Sep 22, 2021

Register »

The service desk is your best technology coach

Sep 30, 2021

Register »

Fundamentals of the cloud and the first principles of securing it

Sep 30, 2021

Register »

Is your IT team ready for the hybrid work model?

  Oct 5, 2021

Register »

 

Top blog posts of this month

 

Securing endpoints: Ensuring hackers don’t manipulate your browsers

 

The never-ending love story between cyberattacks and healthcare

 

Remote work and its lasting impact: What our global research uncovered

 

Differential privacy—what it means for businesses

 
 
Sign up for our blog digest
 

©2021.ManageEngine is a trademark of Zoho Corp.

All other company and product names may be trademark of the respective companies
with which they are associated.
       

September Newsletter 2020

Please add newsletter@manageengine.com to your address book | View online version

 
Newsletter
September 2020
 
 

[Infographic] Ace data security with these four fundamentals

Update your basic data security knowledge, and discover the finer points for safeguarding your business-critical data.

 
Back to basics
 
 
 

Scale your IT and gain the cloud advantage

Equip your IT team with our advanced solutions to manage, monitor, and secure your multi-cloud and hybrid IT environment.

 
Explore now
 
 
 

E-book: A definitive guide for not falling prey to ransomware

Ransomware cost businesses globally more than $75 billion last year. Learn how you can steer clear of the hefty fines, and thwart ransomware by updating your anti-ransomware strategy.

 
Ransomware-proof your data
 
 
 

E-book: Master Linux security management for your network

Not only Windows and Mac, even Linux systems can fall victim to cyberattacks. This e-book helps IT sysadmins improve their existing Linux security procedures.

 
Secure your Linux
 
 
 

Streamline your identity governance with business workflows

Trace employee access and identity changes by empowering managers to validate the requests via automated workflows.

 
Tell me more
 
 
 

Enhance your network traffic analysis with IP address management

With the new IP address management add-on in NetFlow Analyzer, our well-rounded bandwidth management tool, analyze your network’s top users and block ports with anomalous traffic.

 
Dive into the details
 
 
 

The five common mistakes of an incident response plan

The worst cyberattacks are due to the common IR mistakes made repeatedly. Review the five common mistakes of the IR plan and learn how to avoid them.

 
Optimize your IR plan
 
 
 

Active Directory account lockout best practices

Learn and implement these nine account lockout best practices to minimize disruptions in your network.

 
Get started now
 
 
 

Monitor and ensure seamless digital experience for users

Analyze, improve, and continuously test application performance by synthetic simulation on real-browsers like Chrome and Firefox, and ensure a smooth digital experience for users.

 
Enhance user experience
 

Upcoming webinars

 

A five-step plan for effective data protection

  Sep 22, 2020

Register »

Active Directory under attack: From zero access to domain admin in 40 minutes

  Sep 29, 2020

Register »

Identity and Access Management: A prerequisite for cybersecurity?

  Oct 13, 2020

Register »

 

Top blog posts of this month

 

How augmented data management can pave the way for better decision-making

 

5 tips to avoid cyberattacks on EdTech platforms

 

We studied how the pandemic has affected ITSM—here are the results

 

Promote productivity without compromising on security through role-based access control

 
 
 
Sign up for our blog digest
 

©2020.ManageEngine is a trademark of Zoho Corp.

All other company and product names may be trademark of the respective companies
with which they are associated.
       

September Newsletter 2019

Please add newsletter@manageengine.com to your address book | View online version

 

NEWSLETTER
September, 2019
 
 
 

Millions of mobile devices fall prey to mobile
attacks every day. How safe is your enterprise?

 

Leverage Mobile Device Manager Plus to proactively identify,
diagnose, and mitigate mobile threats.

 
Secure your devices
 
 
 

ManageEngine’s IT Security podcast series is here!

 

We are delighted to announce the launch of our weekly IT Security
podcast series; now you can listen to your favorite IT security
experts on the go!

 
Subscribe now
 
 
 

Defend against insider threats with machine
learning algorithms

 

Learn about the fundamentals of user and entity behavior analytics,
and discover how you can prevent sophisticated attacks.

 
Download white paper
 
 
 

[E-book] How to protect your C-suite
from whale phishing attacks

 

Learn the latest techniques scammers are using to attack
 C-suite mailboxes, and how to thwart them.

 
Prevent attacks
 
 
 

EMA research: The must-haves in an enterprise
 network performance management
(NPM) solution

 

EMA, a leading IT research firm, has released a new white paper
 covering the issues in data management and how
 OpManager helps solve those issues.

 
Download white paper
 
 
 

Effortlessly monitor your Nutanix infrastructure

 

Gain visibility into your hyper-converged environment, track key metrics,
and identify and resolve issues easily with support for Nutanix.

 
Learn more
 
 
 

Introducing advanced analytics for
Password Manager Pro

 

Analyze password security, usage patterns, and operation volumes
to gain actionable insights and fortify your privileged accounts.

 
Secure your accounts
 
 
 

Introducing Device Control Plus, the solution
 that drives data protection

 

Bid goodbye to data leaks via removable devices. Device Control
Plus can instantly control, block, and monitor all device
and file accesses.

 
Gain control
 
 
 

Improve the digital experience of end users
across all platforms

 

Ensure your application is not just available, but also fast enough
 to engage users and deliver a smooth end-user experience; you
can also monitor the experience on web and mobile platforms.

 
Enhance the end-user experience
 
 
 

Six surefire ways to protect your network from
impending privilege abuse attacks

 

Worried that a privilege abuse attack might be brewing? Fend
off instances of privilege abuse by implementing these
airtight measures.

 
Safeguard your network
 
 
Webinars
 
Mitigating insider threats with User Behavior Analytics Sept 17, 2019 Register »
Secure, on-the-go Active Directory password self-service Sept 18, 2019 Register »
How to leverage analytics to secure your privileged accounts Sept 19, 2019 Register »
CCPA 101 for IT administrators Sept 19, 2019 Register »
Prevent identity and privilege mishaps with an effective change management strategy Sept 25, 2019 Register »
How to balance usability and security in enterprise password management Sept 27, 2019 Register »
 
 
This month’s top blog posts
 
AssetExplorer gains an edge over other ITAM software
 
——
 
User and entity behavior analytics: The intelligent guardian
of your business
 
——
 
Seven ways to secure macOS deployments in your enterprise
 
——
 
ServiceDesk Plus named in Capterra’s 20 most popular IT
asset management solutions list
 
 
Sign up for our blog digest
 

September Newsletter – 2018

Please add newsletter@manageengine.com to your address book | View online version

 
NEWSLETTER
September, 2018
 
 
 

Learn from the best at our
Chicago User Conference

 

Two days of hands-on training—now at half the price.

 
Claim your early bird pricing
 
 
 

Strengthen your first line of defense
against hackers

 

Don’t be a victim of common hacks like brute force, social engineering, and dictionary attacks. Learn from our expert’s guide to cybersecurity.

 
Up your defenses
 
 
 

Privileged access management practices for healthcare cyber hygiene

 

A PAM routine, when followed religiously, can help healthcare organizations
secure access to patient data as well as prove compliance with HIPAA regulations.

 
Build up your immunity
 
 
 

Auto-remediate your IT incidents

 

Learn how to automatically execute defined scripts or actions
when an alert is received in AlarmsOne.

 
Automate your workflow
 
 
 

[Free e-book] Five revenue metrics
every MSP should track

 

Ready for a reality check? Here are five revenue metrics to help you
see how profitable your business truly is.

 
Track your profits
 
 
 

New in Applications Manager

 

Track key metrics like throughput, latency, and throttled requests
right from Applications Manager.

 
Data on Dynamo
 
 
 

Take control of your network logs

 

Read our handbook to learn how to audit your network perimeter logs
using a SIEM solution.

 
No-nonsense network
 
 
 

Monitor your VMware
datastores from the cloud

 

Storage, latency, snapshot size—what other VMware vSphere
datastore metrics will you monitor?

 
Dig into datastores
 
 
 

Essential Office 365 best practices

 

Plug the security gaps in your Office 365 setup to safeguard against potential threats.

 
Secure your setup
 
 
 

Access management cheat sheet for making your files, folders, and shares bulletproof

 

Improve security and ensure regulatory compliance using a single pane for access permissions management and reporting.

 
Address your access
 
 
 

Troubleshoot from anywhere at any time

 

Enter Remote Access Plus, our new solution for troubleshooting
Windows, Mac, and Linux computers.
With advanced remote control and over a dozen tools,
you can quickly resolve any IT incident.

 
Ready to go remote?
 
 
 

We’re thrilled to be positioned in the first Gartner Magic Quadrant for UEM

 

Desktop Central was recognized for its easy-to-navigate interface
and lower price point than many other UEM vendors.

 
Quite the quadrant
 
 
 

OpManager emerges as a leader in
network monitoring

 

Read why Info-Tech gave OpManager a gold medal in its
Network Monitoring Category Report.

 
Go for gold
 
 
Webinars
 

Flow data: How to configure and monitor it September 25, 2018 Register »
 
Network monitoring: Doing it the smart way September 26, 2018 Register »
 
Top five tips for Office 365 security and compliance September 26, 2018 Register »
 
 
 
This month’s top blog posts
 
Less is more: Role-based performance monitoring with OpManager
 
——
 
Industry best practices for endpoint security
 
——
 
Lessons from one of the first major data breaches in a post-GDPR Europe
 
——
 
“Ok Google, what does Android Pie have in store for enterprises?”
 
——
 
Five worthy reads: The “edge” is near!
 
 
Sign up for our blog digest
 
       

September Newsletter – 2017

September Newsletter – 2016

September Newsletter – 2015

September Newsletter – 2014

Newsletter

September 2014

Mobile Device Management (MDM) for Windows

On-Demand

Site24x7 enhances authentication – Joins the single sign on system of Zoho.com More…

Active Directory

ADAudit Plus introduces ​real-time change auditing of Windows Active Directory with 200+ reports and email alerts. More…

ADSelfService Plus: ​Dashboard gets OU filters for a much more granular overview of information. Also, end users can now crop their photos during self-update and change the default language on the login page itself. More…

ManageEngine ADSolutions welcomes AD enthusiasts to participate in a seminar-cum-workshop on real, continuous Active Directory Auditing with AD Expert Derek Melber. Join here.

Application Performance

Applications Manager introduces performance monitoring support for VMware Horizon View and its components. More…

OpStor support for EMC Avamar is currently in private beta. Sign up here to get a sneak peek.
More…

SQLDBManager Plus now monitors the mirroring details of SQL databases augmenting the existing database and replication monitoring.
More…

Desktop

​Desktop Central now introduces remote control support for Mac Desktops, which makes remote troubleshooting really simple. More…

IT Security

White Paper: ​Are you Audit-Ready for Payment Card Industry Data Security Standard 3.0 (PCI DSS) Compliance? More…

Network Performance

Forrester ​Webinar on Sep. 30: Streamlining business services with effective data center management. Guest Speaker: Andre Kindness, Forrester Research. More…

Free Hyper V Configuration Tool lets you configure Hyper-V 2012 R2 VM resources and expand or clone the virtual hard disk remotely. More…

Events

Oracle OpenWorld, San Francisco, CA
Sep 28 – Oct 2, 2014

​it-sa, Nuremberg, Germany
Oct 7 – 9, 2014

21

Video Zone

Webinar: True Continuous Auditing of Active Directory
Site24x7: Linux Server Monitoring from the Cloud
Follow us
Follow on Facebook Follow on Twitter Follow on LinkedIn Follow on Google Plus Follow on YouTube Follow on Pitstop
Share
Share on FacebookShare on TwitterShare on LinedIn Share on Google Plus
© 2014. ManageEngine is a trademark of ZOHO Corp.
All other company and product names may be trademark of the respective companies with which they are associated.