• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Latest Stories

Unlocking AIOps, Part 3: The business impact

General | September 20, 2023

Unlocking AIOps, Part 3: The business impact

Welcome back to the final installment of this series. In our previous blogs, we discussed AIOps use cases and how to navigate the build vs. buy...

OpManager | September 19, 2023

LAMA: Log analytics and monitoring application

The Securities and Exchange Board of India (SEBI) recently introduced a groundbreaking API-based logging and...

Cybersecurity KPI metrics that CISOs should track

Log360 | September 18, 2023

Cybersecurity KPI metrics that CISOs should track

It's important for chief information security officers (CISOs) to track certain metrics to gauge the...

Gambling away your data: What we know about the Las Vegas cyberattacks

General | September 18, 2023

Gambling away your data: What we know about the Las Vegas cyberattacks

MGM Resorts has announced that it will be shutting down 12 of its hotels and casinos in and around Las Vegas....

Featured

ServiceDesk Plus

[Watch now] Supercharging ITSM with ITOM integration

ServiceDesk Plus

[Free e-book] ITSM doesn’t have to be a struggle—simplify it with ITOM integration

CloudSpend

AWS Lambda’s INIT billing update: What’s changing and why it matters for your cloud costs

ITOM-ITSM integration webinar

ServiceDesk Plus

[Webinar] ITOM and ITSM: A unified approach to incident, asset, and change management

General

Top tips: Keep AI chatbots out of your business!

OpManager | September 15, 2023

Revolutionize your network performance with OpManager's versatile network management tool

As networks become more highly dynamic, managing an entire network efficiently is not an...

Brocade switch configuration management with Network Configuration Manager

Network Configuration Manager | September 15, 2023

Brocade switch configuration management with Network Configuration Manager

Brocade network switches encompass a variety of switch models that cater to diverse...

Staying ahead of LockBit ransomware attacks

Log360 | September 14, 2023

Staying ahead of LockBit ransomware attacks

LockBit is a Ransomware as a Service (RaaS) provider accountable for most LockBit...

Top tips: 5 ways to enhance your knowledge in AI

General | September 14, 2023

Top tips: 5 ways to enhance your knowledge in AI

Top tips is a weekly column where we highlight what’s trending in the tech world today and...

Apache Tomcat monitoring made easy with Applications Manager

Applications Manager | September 13, 2023

Apache Tomcat monitoring made easy with Applications Manager

Tomcat has been a trusted platform for managing your Java based web applications, Java...

Top 5 features to look for in an advanced network port scanner

General | September 13, 2023

Top 5 features to look for in an advanced network port scanner

Network security has become paramount in safeguarding sensitive data and ensuring...

Discover more

Featured

ServiceDesk Plus

[Watch now] Supercharging ITSM with ITOM integration

ServiceDesk Plus

[Free e-book] ITSM doesn’t have to be a struggle—simplify it with ITOM integration

CloudSpend

AWS Lambda’s INIT billing update: What’s changing and why it matters for your cloud costs

ITOM-ITSM integration webinar

ServiceDesk Plus

[Webinar] ITOM and ITSM: A unified approach to incident, asset, and change management

General

Top tips: Keep AI chatbots out of your business!