Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

The recovery: How to overcome a malware attack

A report published by Cybersecurity Ventures predicts that by 2031, ransomware will attack a business, individual, or device every two seconds. The consequences of such an attack extend beyond the leak of sensitive information and financial losses; customers and clients don’t want to do business with organizations that neglect security of customer data. You can’t simply hope an attack will never happen.

New features for enhanced Apple device management coming to Endpoint Central

Earlier this year in June, Apple announced a fresh set of updates to Apple device management mainly focused on improving device security and elevating the device user’s experience. These enhancements and new features are now here and you can leverage them through ManageEngine Endpoint Central to manage your enterprise devices better and deliver the best device experience to your employees.

ManageEngine recognized in the Gartner Magic Quadrant for Security Information and Event Management for the sixth time!

Today, we’re excited to announce that ManageEngine has been recognized in the 2022 Gartner Magic Quadrant for Security Information and Event Management (SIEM), appearing in the report for the sixth time in a row. We are thrilled to be awarded this recognition yet again for our contribution in the SIEM landscape. Get a complimentary copy of Gartner’s latest Magic Quadrant for SIEM here. The shift to cloud computing has accelerated in the last two years.

How important is cryptography in network security?

“Please enter the one-time-password (OTP) that has been sent to your registered mobile number.” The next time you see a statement like this remember that there is a definite reason behind it. IT administrators utilize a variety of security methods, including hardware and software solutions, to secure network data against unauthorized access and other threats. These mechanisms are a preventive measure that ensure network security.

Monitor your firewalls on the go with Firewall Analyzer's mobile app

The number of cybersecurity events faced by companies and businesses across the globe has grown exponentially since the pandemic began. Without adequate network security monitoring practices and around-the-clock monitoring in place, the chances of a cyber incident happening are highly likely. However, not all companies can afford to have a team of highly trained network admins watching over their network 24×7.

Stepping up your security: Protect your network monitoring environment using SHA-2

While the internet grows, so does the online presence of businesses of every scale. Although this allows for seamless business operations, you have to also consider the risks involved. Since organizations rely on networks to carry out their activities and utilize a wide range of networking components like routers, switches, servers, firewalls, and VMs, all of which demand continuous end-to-end management, it is critical to protect and defend these networks from threats and attacks.

7 key features of SIEM that every enterprise administrator should be aware of

A SIEM solution has become an integral part of an organization’s security arsenal. But organizations often overlook the system’s capabilities, owing to a belief that SIEM functionalities are too complex and the architecture inscrutable. Regrettably, they neglect to meet the requirements of their organization with the features of the product. For instance, an organization that deals with the credit card information of customers needs to comply with the PCI-DSS requirement.

Five worthy reads: Who let the stranger in? Video conferencing attacks

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. In this edition, we’ll learn about the evolution of video conferencing since the 2020 pandemic, the security challenges faced by video conferencing tools, how companies and governments have acknowledged the risks, and the best practices to avoid such attacks.

Unify vulnerability detection and remediation with the ManageEngine-Tenable.io integration

According to the latest Ransomware Spotlight Year End report, 56% of the 223 older vulnerabilities identified prior to 2021 are still actively exploited and used as the entry points to ransomware attacks. This warrants the question of why enterprises aren’t patching vulnerabilities regularly.