Network Configuration Manager | September 22, 2022[E-book] Top 4 best practices for compliance managementIt's better to avoid manual handling of compliance management in a large network enterprise for two major reasons: If a device is non-compliant,...
Endpoint Central | September 21, 2022Uber data breach 2022: How the hacker annoyed his way into the network (and our learnings) Illustration by jcomp On Sept. 15, Uber Technologies Inc. was breached by an 18-year-old. The hacker...
Applications Manager | September 21, 2022Java application performance metrics 101Since it first emerged, Java has had a phenomenal rise in usage and popularity. It's ability to be robust and...
General | September 20, 2022Happy IT Professionals Day! A huge shoutout to all the IT prosIt's the coolest day of the year again—time to honor and celebrate the people who work behind the scenes to...
Network Configuration Manager | September 19, 2022Configuration change management process best practicesNowadays, with growing infrastructure and increased complexity, it's near impossible to...
General | September 19, 2022[Indonesia seminar] Why it's crucial to implement AIOps in today's ITOMDue to the growing popularity of digital platforms among a wider range of industries,...
Applications Manager | September 16, 20225 common Java performance problems and how to avoid them using java monitoring toolsJava is one of the most widely used programming languages and it's often used by back-end...
Applications Manager | September 14, 2022A day for the heroes behind the screenDo you ever wonder how our lives got so easy? We can communicate virtually. We can have...
Patch Manager Plus | September 14, 2022September 2022 Patch Tuesday comes with fixes for 63 vulnerabilities, including 2 zero daysPatch Tuesday is here again, this time with a plethora of updates. September 2022’s Patch...
AD360 | September 12, 2022Authentication: The first step towards Zero TrustSince the onset of the pandemic, Zero Trust has become a common trend. Unlike traditional...