• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Latest Stories

Breaking down the San Francisco airport hack

IT Security | April 22, 2020

Breaking down the San Francisco airport hack

On April 7, 2020, the San Francisco International Airport (SFO) released a notice confirming that two of its websites, SFOConnect.com and...

VPN 101: Streamline operations and ensure business continuity with the right VPN [ Free e-book ]

Firewall Analyzer | April 22, 2020

VPN 101: Streamline operations and ensure business continuity with the right VPN [ Free e-book ]

In the ever-evolving business landscape, remote work has become the new normal in light of the COVID-19...

The Monopoly Man takes on privacy, data breaches, and more [Podcast series]

Log360 | April 21, 2020

The Monopoly Man takes on privacy, data breaches, and more [Podcast series]

In the second and final episode of our Expert Tech Talk podcast series, Ian Madrigal, known as the Monopoly...

Secured access to business-critical resources for your remote workforce

Mobile Device Manager Plus | April 21, 2020

Secured access to business-critical resources for your remote workforce

Over the past several years, telecommuting, or remote work, has gained significant traction across a wide...

Featured

ServiceDesk Plus

[Watch now] Supercharging ITSM with ITOM integration

ServiceDesk Plus

[Free e-book] ITSM doesn’t have to be a struggle—simplify it with ITOM integration

CloudSpend

AWS Lambda’s INIT billing update: What’s changing and why it matters for your cloud costs

ITOM-ITSM integration webinar

ServiceDesk Plus

[Webinar] ITOM and ITSM: A unified approach to incident, asset, and change management

General

Top tips: Keep AI chatbots out of your business!

General | April 21, 2020

SQL Server, Part 2: Authentication and authorization mechanisms in SQL Server, simplified

In the previous blog of this series, we discussed how monitoring SQL Server activities...

Mastering website monitoring with Applications Manager

Applications Manager | April 20, 2020

Mastering website monitoring with Applications Manager

In the digital era, most enterprises use a web platform to reach potential customers and...

Five worthy reads: Implementing a successful remote work environment

General | April 17, 2020

Five worthy reads: Implementing a successful remote work environment

Illustration by Amirthalingam Five worthy reads is a regular column on five noteworthy...

IT Security | April 16, 2020

Hardening Windows security: How to secure your organization—Part 2

We're back with part two of our three-part blog series on living-off-the-land attacks. If...

Firewall Analyzer | April 16, 2020

Working from home? Be sure to follow these security best practices [Free e-book]

Until now, a majority of enterprises and their employees have been safely protected by...

COVID-19 sets the stage for cyberattacks: How to protect your business while working remotely

General | April 15, 2020

COVID-19 sets the stage for cyberattacks: How to protect your business while working remotely

Businesses are shifting their operations to a remote work model in the midst of the...

Discover more

Featured

ServiceDesk Plus

[Watch now] Supercharging ITSM with ITOM integration

ServiceDesk Plus

[Free e-book] ITSM doesn’t have to be a struggle—simplify it with ITOM integration

CloudSpend

AWS Lambda’s INIT billing update: What’s changing and why it matters for your cloud costs

ITOM-ITSM integration webinar

ServiceDesk Plus

[Webinar] ITOM and ITSM: A unified approach to incident, asset, and change management

General

Top tips: Keep AI chatbots out of your business!