• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Latest Stories

Begin your GDPR journey with privileged access management

Password Manager Pro | September 5, 2017

Begin your GDPR journey with privileged access management

The core of the GDPR is all about data protection; specifically, securing EU citizens' personal data. However, the GDPR does not explicitly state how...

Support your end users, not your software

General | September 1, 2017

Support your end users, not your software

ITSM is in a period of rapid change, that much is for sure. But with so much changing, it's important to stay...

Identity and access management | August 31, 2017

Ransomware basics: Part 2

In our first installment, we discussed the importance of backing up your data. Without a good backup, chances...

RecoveryManager Plus | August 30, 2017

5 shortcomings of native Active Directory backup and recovery tools

Microsoft's Active Directory (AD) is a key network service in many organizations; without it, those...

Featured

ServiceDesk Plus

[Watch now] Supercharging ITSM with ITOM integration

ServiceDesk Plus

[Free e-book] ITSM doesn’t have to be a struggle—simplify it with ITOM integration

CloudSpend

AWS Lambda’s INIT billing update: What’s changing and why it matters for your cloud costs

ITOM-ITSM integration webinar

ServiceDesk Plus

[Webinar] ITOM and ITSM: A unified approach to incident, asset, and change management

General

Top tips: Keep AI chatbots out of your business!

Getting to know the GDPR: The technical and organizational measures

EventLog Analyzer | August 28, 2017

Getting to know the GDPR: The technical and organizational measures

Before we jump into the third part of this GDPR blog series, let's take a moment to think...

Using Foxit Reader? You might be vulnerable to network breaches 

Endpoint Central | August 25, 2017

Using Foxit Reader? You might be vulnerable to network breaches 

Cybersecurity and cyberattacks have become prominent topics lately. No matter how much...

Identity and access management | August 24, 2017

Ransomware basics: Part 1

There are many articles on ransomware. Many are trying to convince you that if you buy the...

ServiceDesk Plus MSP 9.3 : Better dashboards, project templates, and more

ServiceDesk Plus MSP | August 23, 2017

ServiceDesk Plus MSP 9.3 : Better dashboards, project templates, and more

ServiceDesk Plus MSP is bringing some highly anticipated features to your service desk....

Active Directory Free tools | August 22, 2017

What do the phrases qwerty, password, and 123456 have in common?

They're all weak passwords! Not only are these passwords predictable, they also top the...

[Free webinar]  ITSM metrics vs ITSM analytics: What it takes to connect the dots in your IT support 

ServiceDesk Plus | August 18, 2017

[Free webinar]  ITSM metrics vs ITSM analytics: What it takes to connect the dots in your IT support 

Lost business hours, change success rate, first call resolution rate, and SLA compliance...

Discover more

Featured

ServiceDesk Plus

[Watch now] Supercharging ITSM with ITOM integration

ServiceDesk Plus

[Free e-book] ITSM doesn’t have to be a struggle—simplify it with ITOM integration

CloudSpend

AWS Lambda’s INIT billing update: What’s changing and why it matters for your cloud costs

ITOM-ITSM integration webinar

ServiceDesk Plus

[Webinar] ITOM and ITSM: A unified approach to incident, asset, and change management

General

Top tips: Keep AI chatbots out of your business!