Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

February 2023

PAM Masterclass - Episode 1: Streamlining privileged account governance

In the very first episode of our PAM Masterclass, we’ll learn the essentials of privileged account governance and uncover ways to automatically discover, consolidate, and manage all your privileged identities and resources from a central console. Here's a quick brief on what we will cover in this episode.

Navigating cloud security: Insights from our 2023 outlook report

Cloud technology has become a crucial aspect of modern-day businesses due to its scalability and efficiency, making it a popular choice for organizations across all industries. However, the increased surface area for attacks and the different ways they can be executed has left many organizations vulnerable to threats and data breaches. The cloud threat landscape has been rapidly evolving, so adopting a robust cloud security strategy is essential for organizations of all sizes.

Introducing SSH command controls and advanced PEDM capabilities for Linux in PAM360

PAM360 is ManageEngine’s comprehensive privileged access management (PAM) solution designed for enterprises to protect sensitive, privileged identities from internal and external threats. With the principle of least privilege enshrined across the product, PAM360’s privilege elevation and delegation management (PEDM) capabilities help enterprises eliminate standing privileges and provide granular privileged access in a restricted, time-based manner.

Ensure a secure IT environment with integrated network vulnerability management

NIST's National Vulnerability Database shows a quintuple increase in attacks against firmware in the last four years. These statistics indicate that cyber criminals have continually improved their techniques in penetrating your network via firmware vulnerabilities. To combat these malicious actions, let's first discuss the components that are vulnerable to these attacks.

6 ways to optimize OS imaging

Any organization with an IT infrastructure has to deal with imaging and deploying operating systems to its workforce. Frequent onboarding of employees can cost huge amounts of time and effort for the IT team. Depending on the number of machines, the effort involved in migrating and upgrading operating systems can also be significant. This can be streamlined with the help of a comprehensive OS imaging and deployment solution allowing the IT team to focus on other productive tasks.

ManageEngine Log360 named in GigaOm radar report on automated security operations management (ASOM)

ManageEngine Log360 was featured in the GigaOm Radar report on Automated Security Operations Management (ASOM), published in October 2022 and written by Logan Andrew Green. The research firm’s report includes an in-depth study of the solutions offered by some of the major vendors in the market and highlights Log360 as a Challenger in the ASOM sector. Log360 is a unified SIEM solution from ManageEngine with integrated DLP and CASB capabilities.

Monitoring domain user accounts with elevated access rights

3Standard users having elevated privileges is never good news. Accounts such as domain admins, enterprise admins, schema operators, krbtgt, administrators, and replicators, are a few privileged user groups within an Active Directory (AD) environment. The AdminCount attribute is an AD attribute set to “1” on privileged user accounts.

Five worthy reads: Why should we worry about cyberwarfare in 2023?

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. In this edition, we’ll explain why cyberwarfare could be a potential cyberthreat in 2023. Cyberwarfare was one of the top trending terms in 2022, and the incidents that happened last year have opened up more discussions regarding this topic. Most people think cyberwarfare is synonymous with the term cyberwar.

Audit domain controller logon activity: ADAudit Plus User Logon report

ManageEngine ADAudit Plus is a UBA-driven auditor that bolsters your Active Directory (AD) security infrastructure. With over 250 built-in reports, it provides you with granular insights into what’s happening within your AD, such as all the changes made to objects and their attributes. This can include changes to users, computers, groups, network shares, and more.

Secure your organization with just-in-time access

Just-in-time (JIT) access is a cybersecurity feature where users, applications, or systems are granted access to resources only when needed and for a limited time. This approach limits the risk of privileged accounts gaining unauthorized access to sensitive data. JIT access is often used in conjunction with other security measures—such as multi-factor authentication and encryption—to provide a strong, layered defense against threats.