Latest Posts

Five worthy reads: The “edge” is near!

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we explore how edge computing complements IoT.

For years, I’ve been the kind of person who leaves the air …

ManageEngine 3 min read

Industry best practices for endpoint security

Are your enterprise endpoints all secure? Here is a reality check!

Lately, hackers on the lookout for vulnerable systems have kept the IT industry busy. While various OS and software vendors strive to keep their users’ data intact by providing …

IT Security 4 min read

ITOM seminar in Australia: Attend. Learn. Leverage.

The biggest challenge enterprises face today is embracing new technologies and using them to effectively meet their business requirements. In the past, technology only existed on-premises for enterprises, but now, almost 93 percent of surveyed companies are using the cloud, …

Network 1 min read

Simplifying security auditing, Part 1: Regularly reviewing server activity 

Everyone knows about the importance of log management in IT security. Yet, organizations struggle with implementing effective log management techniques in their networks. This blog series aims to revisit the fundamentals of log management and discuss the different security events …

IT Security 2 min read

 “Ok Google, what does Android Pie have in store for enterprises?”

From Android Enterprise to zero-touch enrollment, Google has recently been taking giant strides towards the enterprise management space. Earlier this year, many of us were wondering which dessert Google would name their newest Android release after. That name turned …

Mobile Device Manager Plus 2 min read

Patch Tuesday updates for August 2018

Last month’s edition of Patch Tuesday left many of us stranded since the patches it contained caused more trouble than the vulnerabilities they were intended to fix.  Situations like this often leave sysadmins with only two options: install the updates …

Desktop Central 2 min read

Protect your data from the Bluetooth bug that has affected billions of devices

With organizations still recovering from the damages caused by recent desktop malware attacks, like SamSam and PowerGhost, a newly discovered bluetooth vulnerability, CVE 2018-5383, is now threatening the data on billions of personal and corporate mobile devices and laptops by …

Mobile Device Manager Plus 2 min read

Less is more: Role-based performance monitoring with OpManager 

Much of a business’ strength lies in its network infrastructure. One way to keep your business up and running is by proactively monitoring key network performance indicators. However, with a plethora of parameters to keep an eye on, and a …

OpManager 2 min read

Microsoft Edge vulnerability paves the way for another data breach

Let’s face it—application vulnerabilities have become inevitable in recent years. When Microsoft released Edge, its web browser created to replace Internet Explorer, it came with new features and enhancements, but it also brought along an unexpected vulnerability that allows hackers …

Patch Manager Plus 2 min read

Provisioning users in an Office 365 environment

Separately provisioning users in Active Directory (AD) and Office 365 is repetitive and inefficient. Other than complex PowerShell scripting, Microsoft doesn’t provide options for provisioning users for AD and Office 365 in bulk. User provisioning requires a systematic and streamlined …

Active Directory 1 min read