• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Latest Stories

Log360 | July 22, 2019

Five reasons to choose Log360, part 5: Integrated compliance management

So far in this blog series, we've seen how Log360 is simple to get up and running, allows you to receive a central view of multiple environments,...

What is Windows 10 migration, and how do you implement Windows 7 to Windows 10 migration?

OS Deployer | July 20, 2019

What is Windows 10 migration, and how do you implement Windows 7 to Windows 10 migration?

Windows 7 to Windows 10 migration Microsoft has announced end of life (EOL) for Windows 7, meaning...

Five worthy reads: Is your enterprise dealing with data sprawl properly?

General | July 19, 2019

Five worthy reads: Is your enterprise dealing with data sprawl properly?

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and...

OpManager bags gold—listed in Feedspot

OpManager | July 17, 2019

OpManager bags gold—listed in Feedspot's top networking blogs and sites to follow in 2019

Great news! The OpManager blog has ranked #15 in Feedspot's top 100 networking blogs and websites to follow....

Featured

ServiceDesk Plus

[Watch now] Supercharging ITSM with ITOM integration

ServiceDesk Plus

[Free e-book] ITSM doesn’t have to be a struggle—simplify it with ITOM integration

CloudSpend

AWS Lambda’s INIT billing update: What’s changing and why it matters for your cloud costs

ITOM-ITSM integration webinar

ServiceDesk Plus

[Webinar] ITOM and ITSM: A unified approach to incident, asset, and change management

General

Top tips: Keep AI chatbots out of your business!

Detecting first time processes on member servers to protect against attacks

ADAudit Plus | July 17, 2019

Detecting first time processes on member servers to protect against attacks

In a previous blog, we saw how ADAudit Plus’ user behavior analytics (UBA) capabilities...

Complying with NIST password guidelines

ADSelfService Plus | July 16, 2019

Complying with NIST password guidelines

Passwords are the most widely used form of authentication across the globe and serve as...

Log360 | July 15, 2019

Five reasons to choose Log360, part 4: Advanced security features

Part two and part three of this blog series gave a detailed look at Log360's in-depth...

Agent Smith materializes from the matrix of Android malware

Mobile Device Manager Plus | July 12, 2019

Agent Smith materializes from the matrix of Android malware

There’s a new shapeshifting strain of Android malware in the mix. It replaces legitimate...

Patch Manager Plus | July 10, 2019

Microsoft Patch Tuesday July 2019: Six publicly disclosed vulnerabilities, two zero-day flaws

The much awaited Microsoft Patch Tuesday updates for July 2019 are here. If you're a...

Log360 | July 8, 2019

Five reasons to choose Log360, part 3: Comprehensive network auditing

In the previous post, we discussed the various environments that Log360 helps you audit...

Discover more

Featured

ServiceDesk Plus

[Watch now] Supercharging ITSM with ITOM integration

ServiceDesk Plus

[Free e-book] ITSM doesn’t have to be a struggle—simplify it with ITOM integration

CloudSpend

AWS Lambda’s INIT billing update: What’s changing and why it matters for your cloud costs

ITOM-ITSM integration webinar

ServiceDesk Plus

[Webinar] ITOM and ITSM: A unified approach to incident, asset, and change management

General

Top tips: Keep AI chatbots out of your business!