Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Episode 3: Exploring ManageEngine PAM's certificate lifecycle management capabilities

In the third installment of the PAM Masterclass training series, we'll focus on mastering certificate lifecycle management. This session will guide you through best practices for deploying, renewing, and monitoring certificates to help you build a secure, well-maintained IT environment.

Episode 24: Guardians of access: PAM, AI, and the future of cybersecurity ft. Ramanathan K

In this episode of Server Room, we dive into the fast-evolving world of Privileged Access Management (PAM) with Ramanathan K, Head of the PAM Suite at ManageEngine. From humble beginnings as a password vault to becoming a core pillar of identity security, PAM has come a long way. We unpack the growing role of AI, the rise of non-human identities, zero standing privileges, and how real-world breaches are being tackled—especially in regions like the Middle East and Africa. Whether you're a security professional or just PAM-curious, this episode is packed with insights you won’t want to miss.

Episode 23: The truth about compliance, audits, and privacy ft. Kudiyarasan Balakrishnan

What does compliance really mean and why does it matter? In this episode of Server Room, we’re joined by Kudiyarasan Balakrishnan, Manager of Compliance at Zoho Corp., to demystify compliance, audits, privacy frameworks like ISO, GDPR, and more. Learn how compliance can drive innovation instead of slowing you down. It enables a business to operate confidently, securely, and responsibly while still moving fast.

A masterclass in PAM implementation: Key factors and common pitfalls | Webinar

Over the last couple of decades, ManageEngine has successfully implemented PAM across various industries and helped organizations of all sizes secure their privileged access while improving operational efficiency. This webinar will help you learn real-world insights, key factors, and common pitfalls to keep in mind when implementing privileged access management solutions.

Episode 18: The Alliance Blueprint- How Partnerships Outsmart Cyber Threats ft.Sharada Murthy

In this episode, we invite Sharada Murthy to talk about identity and access management. We talk about the partner channel network and how shared intelligence can be a boon to organisations, password synchronisation vs. password pass through, cybersecurity and a lot more! Tune in right now to listen to the whole conversation!

Identity security and privileged access essentials for NIS2 compliance

With threat actors always on the edge, international organizations and regional governments have taken it upon themselves to mandate security standards and IT requirements to organizations under their jurisdiction. The European Union's NIS2 Directive disrupted industry trends within Europe when it came into force. NIS2 offers several upgrades to existing regional legal frameworks. It further suggests enhancements to existing cybersecurity measures, especially identity and privileged access security strategies of organizations' IT portfolios.

Episode 15: Are You Making This Mistake With Your Endpoint Security? ft. Santhosh Narasimhamoorthy

Welcome to another electrifying episode of Server Room! This week, we’re tearing up the rulebook on cybersecurity with Santhosh Narasimhamoorthy, Manager and Technical Evangelist for Endpoint Management Security. Buckle up as we explore how AI is not just a buzzword—it’s rewriting the play book for protecting every device, user, and byte in your network. Timestamps: Perfect for: IT managers, CISOs, and anyone who’s ever side-eyed a “Nigerian prince” email.