• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Latest Stories

Application whitelisting using Software Restriction Policies

General | October 25, 2018

Application whitelisting using Software Restriction Policies

Software Restriction Policies (SRPs) is a Group Policy-based feature in Active Directory (AD) that identifies and controls the execution of various...

Top five tips for Office 365 security and compliance, Part 2

General | October 23, 2018

Top five tips for Office 365 security and compliance, Part 2

In our previous blog, we broadly discussed how our webinar Top five tips for Office 365 security and...

The Australian way of mitigating cybersecurity incidents

Endpoint Central | October 19, 2018

The Australian way of mitigating cybersecurity incidents

Many enterprises are actively building their IT security procedures to prevent the alarming number of...

ADSelfService Plus | October 18, 2018

Empower students to reset their passwords by themselves

Back to school Active Directory password management blues are a huge problem. If you're an IT administrator at...

Featured

ServiceDesk Plus

[Watch now] Supercharging ITSM with ITOM integration

ServiceDesk Plus

[Free e-book] ITSM doesn’t have to be a struggle—simplify it with ITOM integration

CloudSpend

AWS Lambda’s INIT billing update: What’s changing and why it matters for your cloud costs

ITOM-ITSM integration webinar

ServiceDesk Plus

[Webinar] ITOM and ITSM: A unified approach to incident, asset, and change management

General

Top tips: Keep AI chatbots out of your business!

Top five tips for Office 365 security and compliance, Part 1

General | October 18, 2018

Top five tips for Office 365 security and compliance, Part 1

Office 365 is a favorite target for hackers across the globe. Of all the messages sent to...

Five worthy reads: The 5G digital metamorphosis 

General | October 17, 2018

Five worthy reads: The 5G digital metamorphosis 

Five worthy reads is a regular column on five noteworthy items we’ve discovered while...

Are your systems still running an old Windows OS? It

Endpoint Central | October 16, 2018

Are your systems still running an old Windows OS? It's time to move to Windows 10

In less than 20 months, Windows 7 will reach end-of-life status, putting many...

General | October 15, 2018

Halloween NCSAM contest for IT security experts!

With Halloween fast approaching, the search for the scariest costumes is underway. But as...

Secure workstations by monitoring and alerting membership changes on Local Administrators Group, Part 1

Identity and access management | October 11, 2018

Secure workstations by monitoring and alerting membership changes on Local Administrators Group, Part 1

Imagine you're an admin in a company that prides itself on its security practices, which...

Next stop: Oracle OpenWorld 2018!

Applications Manager | October 10, 2018

Next stop: Oracle OpenWorld 2018!

The Applications Manager team is all set to attend Oracle OpenWorld 2018. You heard that...

Discover more

Featured

ServiceDesk Plus

[Watch now] Supercharging ITSM with ITOM integration

ServiceDesk Plus

[Free e-book] ITSM doesn’t have to be a struggle—simplify it with ITOM integration

CloudSpend

AWS Lambda’s INIT billing update: What’s changing and why it matters for your cloud costs

ITOM-ITSM integration webinar

ServiceDesk Plus

[Webinar] ITOM and ITSM: A unified approach to incident, asset, and change management

General

Top tips: Keep AI chatbots out of your business!