• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Latest Stories

ManageEngine Recognized as a Customers

Log360 | August 1, 2023

ManageEngine Recognized as a Customers' Choice in 2023 Gartner® Peer Insights 'Voice of the Customer': Security Information and Event Management (SIEM) for the fourth time

We're thrilled to announce that ManageEngine has once again been recognized as a Customers' Choice in the 2023 Gartner Peer Insights 'Voice of the...

OpManager celebrates Top Rated accolade from TrustRadius!

OpManager | August 1, 2023

OpManager celebrates Top Rated accolade from TrustRadius!

We believe that our customers' satisfaction speaks volumes about the value we deliver. That's why we're...

Dicas importantes: 5 métricas para avaliar a eficiência do seu programa de segurança cibernética

General | August 1, 2023

Dicas importantes: 5 métricas para avaliar a eficiência do seu programa de segurança cibernética

2.200 ataques cibernéticos ocorrem diariamente, com uma média de 39 ataques a cada segundo. À medida que...

A estratégia multicloud na era digital

General | August 1, 2023

A estratégia multicloud na era digital

Em uma era em que as inovações digitais acontecem em alta velocidade, a nuvem tornou-se crucial para todos os...

Featured

CloudSpend

AWS Lambda’s INIT billing update: What’s changing and why it matters for your cloud costs

ITOM-ITSM integration webinar

ServiceDesk Plus

[Webinar] ITOM and ITSM: A unified approach to incident, asset, and change management

General

Top tips: Keep AI chatbots out of your business!

Patch Manager Plus

February Patch Tuesday comes with fixes for 55 vulnerabilities, including 4 zero-days

Endpoint Central

Guarding open-source AI: Key takeaways from DeepSeek’s security breach

Five worthy reads: Cybersecurity in the age of AI — Battling sophisticated threats

General | July 28, 2023

Five worthy reads: Cybersecurity in the age of AI — Battling sophisticated threats

Five worthy reads is a regular column on five noteworthy items we have discovered while...

General | July 27, 2023

SysAdmin Day 2023: Honoring the unsung heroes of technology

On this SysAdmin Appreciation Day, we pause to honor the remarkable individuals who work...

Top tips: 5 metrics to evaluate the efficiency of your cybersecurity program

General | July 27, 2023

Top tips: 5 metrics to evaluate the efficiency of your cybersecurity program

2,200 cyberattacks occur daily, with an average of 39 attacks every second. As we come up...

Comprehensive visibility is the foundation for effective threat detection and response

Log360 | July 27, 2023

Comprehensive visibility is the foundation for effective threat detection and response

Businesses today are more dependent than ever on technology, making strong threat...

General | July 27, 2023

Log360 wins 2023 Fortress Cybersecurity Award

The Fortress Cybersecurity Award program highlights and rewards creative thinking,...

Enable real-time updates with new integrations of webhooks with NetFlow Analyzer

NetFlow Analyzer | July 26, 2023

Enable real-time updates with new integrations of webhooks with NetFlow Analyzer

A webhook, or web callback, is a user-defined HTTP callback used to alter the behavior...

Discover more

Featured

CloudSpend

AWS Lambda’s INIT billing update: What’s changing and why it matters for your cloud costs

ITOM-ITSM integration webinar

ServiceDesk Plus

[Webinar] ITOM and ITSM: A unified approach to incident, asset, and change management

General

Top tips: Keep AI chatbots out of your business!

Patch Manager Plus

February Patch Tuesday comes with fixes for 55 vulnerabilities, including 4 zero-days

Endpoint Central

Guarding open-source AI: Key takeaways from DeepSeek’s security breach