Posts

Showing posts from March 27, 2016

Produk baru: ManageEngine Reports

Image
ManageEngine Reports is an on-premise reporting and business intelligence service that helps you to easily analyze your business data and create insightful reports & dashboards for informed decision-making. It also enables you to easily create and share powerful reports in minutes with no IT help.

As an ITSM user you need intelligent reporting from your service desk, to help you make accurate decisions. Ideally, a solution that provides a flawless visual representation of your help desk information, in the least possible time. Now, make better and quicker decisions everyday with ManageEngine's advanced analytics suite. The advanced analytics platform seamlessly integrates with ServiceDesk Plus, giving you a high level view of your help desk, with the ability to drill-down into specifics. Create intuitive reports and view live dashboards easily and flexibly without writing lengthy database queries.








Kontak kami untuk implementasi ITSM Report Anda.

Produk baru : Log360

Log360 Overview Log360 is your one-stop solution for all log management and network security challenges. It is an integrated solution that combines EventLog Analyzer and ADAudit Plus into a single console to help you manage your Active Directory auditing and network security easily. Log360 ensures your network security byCollecting, monitoring, analyzing, and archiving logs from syslog devices, perimeter security devices such as firewalls, routers, and switches, Linux/UNIX servers, Windows servers, applications, and more.Monitoring privileged user activities.Monitoring and auditing real-time Active Directory changes in real time.Instantly identifying GPO modifications.Tracking OU changes in your Active Directory. Getting in-depth insight into internal security threats.Providing detailed information on confidential file and folder access.Helping meet the stringent requirements of regulatory mandates such as PCI DSS, FISMA, HIPAA, SOX, GLBA, GPG 13, and more.Combating external security …

Sudahkah anda melakukan Backup dan Recovery Active Directory ?

Image
Active Directory Backup and Recovery
Free Download  Active Directory is a crucial part of any organization, regardless of its size. Downtime due to accidental deletion or modification of AD data causes businesses to lose not just revenue but the trust of their customers, too. The truth is that such downtime is not uncommon. The severity of the disaster depends on the volume and the type of data deleted or modified. To reduce the downtime due to accidental deletion of AD objects, you need to swiftly restore the modified or deleted data. The native Active Directory Backup and Recovery utility from AD fails to deliver rapid restorations due to its clunky user interface and lack of control over attribute-level changes. This emphasizes the need for an AD backup and restoration tool that is user friendly and able to restore all AD objects, including users, computers, groups, containers, OUs, DNS data, and GPOs. RecoveryManager Plus is a web-based Active Directory backup and restoration solu…

Bagaimana mengontrol akses ke system critical ?

Image
Enterprise IT Management SoftwareHow do you control concurrent privileged access to critical IT resources?In enterprises, quite often, many administrators might be accessing a system in production environment concurrently. They might be attempting to carry out conflicting operations, unconnected tasks or even trying the same activity.

In the absence of proper planning and coordination, such concurrent access on IT resources could affect the integrity of data/information, lead to conflicts, duplication of effort and a troublesome assortment of other issues. For instance, two administrators might be attempting registry edits on the same system concurrently. Conflicts during this operation might lead to costly damages.

In other cases, for certain sensitive IT resources in production, there might be requirements to grant exclusive, time-limited access to a particular administrator. During that perio…

Perlu SharePoint Management dan Audit ?

SharePoint Management and Auditing Solution SharePoint platform provides easy hosting and collaboration of business data both online and on premise. The flexibility and the ease of use made companies to adopt SharePoint rapidly to host their business data. However the high level of collaboration and dynamic nature of the content pose challenges to SharePoint administrators in managing and auditing the SharePoint servers. Every SharePoint administrators need for the hour is a comprehensive tool that can monitor, analyze and audit their multiple SharePoint deployments from a central console. ManageEngine SharePoint Manager Plus is a tool that does all these and more. It helps you to manage, audit, report on both the on-premise and Office 365 SharePoint environments. It also allows you to monitor, track and analyze all the activities on your SharePoint infrastructure which facilitates informed, timely and accurate decision making and management. What SharePoint Manager Plus can do? Infr…

Perlu File Audit ? Gunakan File Audit Plus

Real Time File Server Auditing & Reporting Tool ManageEngine FileAudit Plus is an agent-based file auditing and reporting software. Monitor in real-time the changes to all files in the file system along with thorough reports on every activity as to 'who' did 'what', 'when' and 'from where'. Keep track of changes made to the files, file objects in the folders or sub-folders and shares. Watch out for any changes made to a particular type of file (for e.g. *.log) or choose to exclude servers and file types. Any good organization's security policies would recommend the use of a real-time file monitoring tool to continuously monitor the system files and Compliance standards like PCI DSS (11.5), Sarbanes-Oxley (Section 404), FISMA (NIST SP800-53) specifically regulate the need to perform periodic checks for any unauthorized modification of critical files on Windows File servers (system files, configuration files or text files; and ensure a reporting …

Perkuat IT policy anda dengan Password Manager Pro

Image
Enterprise IT Management SoftwareAn automated solution to enforce IT policy on standard password practices Growing instances of information security incidents have forced IT enterprises to put an effective IT policy in place. All such policies stress three essentials, among the numerous guidelines: Usage of unique, strong passwords across all IT resourcesRotating the passwords at periodic intervalsRole-based access controls for IT resources Enforcing the IT policy with respect to the privileged passwords turns out to be a daunting task to carry out manually. For instance, entering a new password that satisfies the strong password policy — numerals, mixed case, special characters, minimum length and so on — would be a nightmare.
Similarly, when there are too many IT resources, administrators often find it easier to assign a non-unique, same password to all the resources. Or they would prefer to recycle previously used passwords.
Above all, periodically changing the passwords …