• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Latest Stories

How Secure Is Password Manager Pro?

Password Manager Pro | March 31, 2015

How Secure Is Password Manager Pro?

Gone are the days when all you needed was a strong password to guard your data. Now, we live in an era where you not only choose a strong password,...

General | March 30, 2015

Q&A on the Science behind Effective Service Catalogues

Recently, ManageEngine asked me to do  a webinar around service catalogues. The webinar was named "The Science...

Hacking Hospitality: How to Fight the Cyber-criminals Targeting Business Travelers

Password Manager Pro | March 28, 2015

Hacking Hospitality: How to Fight the Cyber-criminals Targeting Business Travelers

Traditionally, financial institutions have remained the top targets of cyber-criminals across the globe. Of...

ADManager Plus | March 26, 2015

Establishing an Active Directory security baseline is essential

After my initial Global Active Directory Seminar world tour, I came back with ​​one key concept that I feel...

Featured

ServiceDesk Plus

[Watch now] Supercharging ITSM with ITOM integration

ServiceDesk Plus

[Free e-book] ITSM doesn’t have to be a struggle—simplify it with ITOM integration

CloudSpend

AWS Lambda’s INIT billing update: What’s changing and why it matters for your cloud costs

ITOM-ITSM integration webinar

ServiceDesk Plus

[Webinar] ITOM and ITSM: A unified approach to incident, asset, and change management

General

Top tips: Keep AI chatbots out of your business!

ServiceDesk Plus | March 23, 2015

Four More Overlooked but Highly Valuable Help Desk Questions

Sherlock Holmes has the power of deduction that helps him solve rather difficult cases. If...

Autoarchiving security logs in Event Viewer

Identity and access management | March 20, 2015

Autoarchiving security logs in Event Viewer

A small, nearly hidden feature of the Event Viewer by Microsoft is the ability to...

Webinar - The Science Behind Effective Service Catalogues

General | March 16, 2015

Webinar - The Science Behind Effective Service Catalogues

Join us for the free webinar, The Science Behind Effective Service Catalogues on Thursday...

Identity and access management | March 13, 2015

Active Directory Recovery Management and Change Control

[embed]https://www.youtube.com/watch?v=aQUHmIyh8x0[/embed] ...

EventLog Analyzer | March 12, 2015

Protective, GPG13-Compliant Monitoring Using EventLog Analyzer

​The journey to a thousand IT problems begins with a single compliance lapse. Yes, this...

​Desktop Central Supports Kiosk Mode for Samsung Devices

Endpoint Central | March 11, 2015

​Desktop Central Supports Kiosk Mode for Samsung Devices

Today, we increasingly depend on technology, especially mobile technology, to accomplish...

Discover more

Featured

ServiceDesk Plus

[Watch now] Supercharging ITSM with ITOM integration

ServiceDesk Plus

[Free e-book] ITSM doesn’t have to be a struggle—simplify it with ITOM integration

CloudSpend

AWS Lambda’s INIT billing update: What’s changing and why it matters for your cloud costs

ITOM-ITSM integration webinar

ServiceDesk Plus

[Webinar] ITOM and ITSM: A unified approach to incident, asset, and change management

General

Top tips: Keep AI chatbots out of your business!