8:00am - 8:45am
Registration & conference breakfast
8:45am - 9:00am
Welcome note
9:00am - 9:40am
IT led Digital TransformationsRaj Sabhlok - President, Zoho Corp
9:40am - 10:20am
Delivering a great workplace experience with ManageEngineRajesh Ganesan, Vice President of Product Management
10:20am - 10:40am
Discover how 'Atlantis The Palm™ Dubai' manages its IT operations using ManageEngine solutions.Alejandro Vidales, Director of IT Operations
10:40am - 10:50am
Networking break
10:50am - 12:30pm

IT Operations Management

OpManager
Demystifying your complex network infrastructure
Discovery and classification
  • Understanding network infrastructure
  • Device discovery and its methods
  • Virtualization and Storage Discovery
  • Important steps to simplify the discovery
Monitoring Server and Network performance
  • Monitoring device/interface availability.
  • Monitoring server performance - storage, processes, services,eventlogs,scripts, etc.
  • Monitoirng Virtual server and storage performance.
  • Monitoring network performance - devices, bandwidth, hardware.
  • IP SLA monitoring.
Fault management, IT Automation and Maps
  • Effective fault monitoring with threshold-based alarms and notifications.
  • Events - VMware, Syslogs, SNMP traps.
  • Using IT Workflows to remediate problems.
  • Business views, Dashboards, Widgets & NOC Views.
  • Integration and Roadmap
See how Consolidated Contractors Company uses ITOM Solutions to demystify its complex network infrastructure.
Fayez Al Saadi talks about how OpManager & ITOM solutions have helped simplify network management in Consolidated Contractors Company.
Discovery and classification
Learn the best methods for quick discovery
  • Understanding network infrastructure
  • Device discovery and its methods
  • Virtualization and Storage Discovery
  • Important steps to simplify the discovery
Monitoring Server and Network performance
Get to know the complete set of monitoring options for your organization
  • Monitoring device/interface availability.
  • Monitoring server performance - storage, processes, services,eventlogs,scripts, etc.
  • Monitoirng Virtual server and storage performance.
  • Monitoring network performance - devices, bandwidth, hardware.
  • IP SLA monitoring.
Fault management, IT Automation and Maps
Arrest major faults by proactive monitoring and effective fault management
  • Effective fault monitoring with threshold-based alarms and notifications.
  • Events - VMware, Syslogs, SNMP traps.
  • Using IT Workflows to remediate problems.
  • Business views, Dashboards, Widgets & NOC Views.
  • Integration and Roadmap

Identity and Access Management

ADManager Plus
Managing a Hybrid Active Directory Environment

  • How to simplify user provisioning for on-prem and in the cloud.
  • Which reports and settings can help you manage licenses.
  • How password management can be setup to reduce help desk calls.
  • What is available to help you improve storage allocation and performance.

IT Service Management

Service request management
Craft a straightforward service catalog for everyday ITSM
  • Customize your self-service portal
  • Create service templates, communicate service-level agreements (SLAs), and configure costs
  • Set up a work-breakdown structure and approval workflows
Service request management
Create an impressive user onboarding experience using the service catalog
  • Tailor a service template for the user onboarding process
  • Leverage various ManageEngine solutions
  • Manage dynamic SLAs, and measure user satisfaction 
Service request management
Enterprise Service Management (ESM): Manage IT and non-IT service desks in one application
  • Publish a one-stop shop for users with the ESM Portal
  • Effectively collaborate with other business functions
  • Orchestrate work orders across departments with minimal customization

IT Security

Password Manager Pro
Privileged Accounts - Great power and the Greater responsibility
Discover the strategies of identifying and managing privileged accounts to counter insider threats with ManageEngine's privileged account governance solution.
  • Learn about the techniques of identifying privileged accounts that are scattered across your IT Infrastructure and how to manage them effectively.
  • Best practices on managing Windows service accounts and eliminating hard-coded credentials.
  • Learn how the real-time monitoring and reporting functions can help organizations prepare for and meet regulatory audits around privileged account usage.
  
Key Manager Plus
Gain complete visibility of SSL and SSH environments.
Fortifying your environment by managing the end-to-end lifecycle of SSL Certificates and SSH Keys.
  • Learn how to set up a central system to manage the entire life cycle of SSL certificates including discovery, certificate signing process, deployment, and expiration.
  • See the native integration with third party CA's such as GoDaddy, Verisign, Let's Encrypt and how to perform all certificate management tasks from within Key Manager Plus.
  • Take control of the SSH key sprawl by learning how to set up a central repository to manage the complete life cycle of SSH keys including discovery, user mapping, deployment, and periodic rotation.
Access Manager Plus
Regulating privileged remote sessions for a tighter access governance.
Managing remote access to critical business systems, boost privileged session security, and eliminate inefficient workflows.
  • Learn how to ensure a reliable and faultless audit trail of every action taken by privileged users.
  • Monitor and record privileged sessions to meet audit requirements and stop suspicious privileged sessions in real-time.
Protect target systems by enabling remote access without exposing sensitive credentials and by leveraging secure jump server design.
PAM360
Beyond conventional Privileged Access Management.
Find out how you can increase the efficiency of your PAM solution by leveraging contextual integrations and how to gain intelligent threat insights with ManageEngine's unified PAM solution.
  • Learn how User behavior analytics and Context-aware event correlations are a must for bolstering privileged access governance.
  • Enhancing enterprise security with just-in-time privilege elevation and least privilege principles.
  • Limiting attack surface with DevOps integration and pipeline security.
  • Securing application credentials with A-to-A and A-to-DB integration.
  • Extending privileged access management capabilities to SaaS/IaaS platforms.
12:30pm - 1:30pm
Lunch and networking
1:30pm - 2:45pm

IT Operations Management

Applications Manager
How IT Ops teams can resolve application performance issues in complex business infrastructures.
  • Identifying the performance problems.
  • Fault management with Root Cause Analysis (RCA).
  • Business service management and application interdependencies.
  • Application analytics, Dashboards and user management.
How DevOps can use Applications Manager to optimize application performance.
  • Leveraging synthetic transactions to capture end user interactions.
  • Monitoring the complete end user journey, from log in to log off.
  • Gaining visibility into your containerized environments
  • Troubleshooting common application performance issues such as CPU spikes and memory leaks.
  • Debugging transaction performance problems (including slow database calls).

Identity and Access Management

ADSelfService Plus
Increasing password security and incorporating MFA
  • The true state of our passwords and where they are weak.
  • How attackers break into passwords and hashes.
  • What can be done to increase password security.
  • Where MFA can be used to increase identify management security.
O365 Manager Plus
Gain real insight into Office 365
  • Office 365 auditing and compliance management.
  • Office 365 management and help desk delegation made easy.
  • Password expiry notifier to alert users about their password status.
  • One-stop shop for Azure AD, Exchange Online, OneDrive & Skype for Business, Sway, Microsoft Teams, and more.

IT Service Management

Incident Management
Run a pit stop for desktops using ServiceDesk Plus
  • Categorize, communicate, and collaborate
  • Set up automated actions and SLAs
  • Incorporate knowledge management
Incident Management
Commission a hyper-efficient incident management production line
  • Build runbooks for different types of incidents
  • Create contextual customizations
  • Initiate root cause analysis (RCA), formulate fixes, enrich the knowledge base (KB), and trigger changes
Incident Management
Build a global incident management command center 
  • Operate a central service desk
  • Adopt AI in the incident management process
  • Gain control over your distributed infrastructure

IT Security

DataSecurity Plus
Securing file servers and ensuring compliance.
  • Data discovery.
  • Real-time auditing for Windows file servers.
  • Detecting and mitigating ransomware.
  • Latest features and road map for DataSecurity Plus.
2:45pm - 3:00pm
Networking break
3:00pm - 4:45pm

IT Operations Management

Netflow Analyzer
Bandwidth management made easy
  • Getting visibility into bandwidth consumption
  • Identify top bandwidth consumers
  • Prioritize bandwidth for business critical apps via traffic shaping
  • Solve bandwidth issues with NetFlow Analyzer
Network Configuration Manager
How to track network configuration changes, trigger backups and audit compliance?
  • Configuration backups and upload
  • Disaster recovery
  • Realtime change detection
  • CLI configlets
  • Compliance
Firewall Analyzer
Firewall log and network security management
  • Managing internal and external threats
  • Identifying security loop holes
  • Achieving compliance
  • Rule management

Identity and Access Management

RecoveryManager Plus
Comprehensively back up, restore, and recycle AD objects.
  • Which objects RecoveryManager Plus can recover and restore.
  • What level of detail you can recover user objects from changes.
  • How to see historical group changes and restore to any point in time.
  • The power that RecoveryManager Plus has over recovering from GPO changes.
AD360
Balancing Identity access and IT governance from one console.
  • Tips to simplify Active Directory management.
  • Auditing On-prem and Azure AD to identify possible IOCs.
  • Tips for effective self-service password management, Prevent attacks by implementing Multi factor authentication and put password woes to rest.
  • Hybrid Exchange Monitoring , Reporting & Auditing made easy..

IT Service Management

Change Management
Reap the benefits of mature change control and management practices
  • Standardize processes, and eliminate approval bottlenecks
  • Co-create: Engage with customers, sponsors, and users on multiple levels
  • Evaluate risk, analyze the impact, control downtime, and deliver value

IT Security

Endpoint security
Approaching endpoint security in the current threat landscape
  • Understanding why a multi-layered approach is the way forward for IT security in 2020.
Endpoint security
Prophecies on insider and outsider threats
  • Formulate strategies to effectively protect endpoints in your enterprise from both insider and outsider threats.
Endpoint security
Known and unknown vulnerabilities
  • Understand how to protect your endpoints from vulnerabilities proactively - be it known or unknown.
Endpoint security
Inheriting top 5 CIS security controls
  • Understanding CIS security controls and applying it to attain compliance.
4:45pm - 5pm
Wrap-up
8:00am - 8:45am
Registration & Welcome coffee
8:45am - 10:45am
*Exclusive Site24x7 product sessions will be held from 8:45am - 10:45am.

  • Full stack monitoring solution for your multi cloud and hybrid cloud applications.
  • Surprised with your AWS Bills ? No more. Visualize and Optimize with better control with Site24x7 CloudSpend.
  • Transparently communicate incidents and reduce call to your helpdesk with Site24x7 StatusPage.

Endpoint Management

Endpoint management solutions
Transition to unified management and security

  • Learn how to manage multiple device types across multiple platforms with unified management.
Endpoint management solutions
Keeping vulnerabilities at bay using patch management

  • Understand how to protect your endpoints from vulnerabilities proactively - be it known or unknown.
  • Add-on(s) for unified security.
Endpoint management solutions
Application Control for modern & traditional software distribution

  • Silent, unattended and interactive software installation/removal.
  • Prohibit or allow an application in endpoints.
  • Privileged access for an application.
Endpoint management solutions
New endpoints, newer management challenges

  • Leveraging modern management capabilities to keep your Windows 10 and Mac management on point.

IT Service Management

Asset Management
Bring the ITAM advantage to your service desk
  • Discover, catalog, configure, and audit IT assets
  • Manage the complete asset life cycle
  • Tightly align ITAM with ITSM
Asset Management
Ensure license compliance without spending a fortune
  • Compile a single source of truth for software licenses
  • Track software installations across your organization
  • Optimize your software license purchases
AD solutions
Empower your service desk with user management capabilities
  • Manage Active Directory user accounts from ServiceDesk Plus
  • Tie Active Directory operations to ITSM processes
  • Keep your Active Directory clean, secure, and optimized

IT Security

ADAudit Plus
Setting real-time alarms for important Windows events.
Crucial events that will help you flag suspicious activities in the following categories:
  • Logon auditing.
  • Policy Change.
  • User Account Management.
  • Security Group Management.
10:45am - 11:00am
Networking Break
11:00am - 12:30pm

Endpoint Management

Endpoint management solutions
Comprehensive mobile device management
  • Manage the entire life-cycle of the device - from on-boarding to retirement across all major platforms.
Endpoint management solutions
Easing endpoint management
  • Managing inventory and remotely troubleshooting devices - do it all hassle-free.

IT Service Management

Advanced analytics
Save big with advanced analytics for asset management
  • How to investigate areas where your IT budget is being spent.
  • Tips to cut down IT spend at different stages of an asset life-cycle.
  • How to maximize ROI on IT asset purchases.
Extensions
Up your API game with ScriptMaster's cheat sheet
  • Build last-mile customizations, and bridge process gaps
  • Get hands-on with ServiceDesk Plus extensions
  • Utilize ScriptMaster's repository

IT Security

UBA/UEBA
Machine Learning and SIEM.
  • Traditional approach to detect attacks.
  • Why Machine Learning is needed.
  • Logical approach to detecting attacks.
  • Use cases.
EventLog Analyzer
Effective log management simplified.
  • The log management process.
  • Reporting on crucial security events.
  • Searching through logs.
  • Triggering alerts to detect threats.
  • Managing and responding to incidents.
12:30pm - 1:30pm
Lunch and networking
1:30pm - 3:00pm

Endpoint Management

Endpoint management solutions
Handling OS Deployment
  • Learn how to do Bare-metal provisioning.
  • Ease the process of Window 7 to 10 Upgrade.
Endpoint management solutions
Better together: Leveraging UEM capabilities
  • Learn how to better utilize UEM features by integrating it with other applications.
  • Understanding security controls and applying it to attain compliance.
Endpoint management solutions
Architected to ease your management woes
  • Understanding Architecture of UEM.
  • Managing devices outside the network.
  • Built-in Diagnostic tool.

IT Service Management

Did you know
Features, enhancements, and hacks you can't miss.
  • Summary of new features, enhancements, and updates
  • Tips and tricks
Product Roadmap
Sneak peek at upcoming ServiceDesk Plus features
  • Collaborate with the creators of ServiceDesk Plus in our forums.
  • Get a first look at beta features
  • Voice your suggestions

IT Security

Log360
IT Security and Risk: recommendations to safe guard one's IT landscape with SIEM - Log360

  • Dealing with attacks: Auditing, compliance, and continuous monitoring are critical.
  • Setting up critical security alerts to detect potential threats in your network through Log360.
  • Understanding the modules within Log360.
3:00pm - 3:15pm
Networking break
3:15pm - 4:15pm
Certification and wrap up.
Note: Agenda is subject to change*