• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Latest Stories

Recovering from OneDrive for Business ransomware attacks

RecoveryManager Plus | February 11, 2020

Recovering from OneDrive for Business ransomware attacks

Ransomware has been a growing threat in recent years, and experts now estimate the cost of these attacks at $7.5 billion in the USA alone in 2019....

Sizing up the CCPA: How the USA

General | February 11, 2020

Sizing up the CCPA: How the USA's new privacy regulation measures up against the GDPR 

The California Consumer Protection (CCPA) act took effect on January 1, 2020, and companies across the globe...

How Hinduja Global Solutions saved $3 million in a year using OpManager

OpManager | February 10, 2020

How Hinduja Global Solutions saved $3 million in a year using OpManager

Hinduja Global Solutions (HGS), a part of the Hinduja Group, is a Bangalore-based business process management...

IT security: Disrupting the cybersecurity kill chain by detecting domain reconnaissance 

IT Security | February 3, 2020

IT security: Disrupting the cybersecurity kill chain by detecting domain reconnaissance 

Cyberattacks are a growing threat, and organizations are investing time and money in security strategies to...

Featured

ServiceDesk Plus

[Watch now] Supercharging ITSM with ITOM integration

ServiceDesk Plus

[Free e-book] ITSM doesn’t have to be a struggle—simplify it with ITOM integration

CloudSpend

AWS Lambda’s INIT billing update: What’s changing and why it matters for your cloud costs

ITOM-ITSM integration webinar

ServiceDesk Plus

[Webinar] ITOM and ITSM: A unified approach to incident, asset, and change management

General

Top tips: Keep AI chatbots out of your business!

Five worthy reads: Mastering cybersecurity with AI and machine learning

General | January 31, 2020

Five worthy reads: Mastering cybersecurity with AI and machine learning

Five worthy reads is a regular column on five noteworthy items we’ve discovered while...

Meet a Major Player in the UEM and EMM industries

Endpoint Central | January 31, 2020

Meet a Major Player in the UEM and EMM industries

We are delighted to share that market research and advisory firm, IDC, has recognized...

This 2020, stay on top of your IGA game

ADSelfService Plus | January 30, 2020

This 2020, stay on top of your IGA game

The Identity Governance and Administration (IGA) market has seen rapid growth in recent...

Vulnerability Manager Plus | January 30, 2020

Endpoint security: The key to protecting your enterprise

To operate efficiently, businesses today use numerous devices such as laptops, desktop...

Unpatched zero-day vulnerability in Internet Explorer exploited in the wild

Patch Manager Plus | January 28, 2020

Unpatched zero-day vulnerability in Internet Explorer exploited in the wild

Barely a week after Patch Tuesday, internet security company Qihoo 360 has discovered yet...

9 essential UEM capabilities that empower your IT administration

ManageEngine UEM | January 28, 2020

9 essential UEM capabilities that empower your IT administration

Unified endpoint management (UEM) is an IT best practice and strategy for securing and...

Discover more

Featured

ServiceDesk Plus

[Watch now] Supercharging ITSM with ITOM integration

ServiceDesk Plus

[Free e-book] ITSM doesn’t have to be a struggle—simplify it with ITOM integration

CloudSpend

AWS Lambda’s INIT billing update: What’s changing and why it matters for your cloud costs

ITOM-ITSM integration webinar

ServiceDesk Plus

[Webinar] ITOM and ITSM: A unified approach to incident, asset, and change management

General

Top tips: Keep AI chatbots out of your business!