Network Configuration Manager | September 19, 2022Configuration change management process best practicesNowadays, with growing infrastructure and increased complexity, it's near impossible to manage configuration changes manually. Let's look at an...
General | September 19, 2022[Indonesia seminar] Why it's crucial to implement AIOps in today's ITOMDue to the growing popularity of digital platforms among a wider range of industries, ITOps teams are facing...
Applications Manager | September 16, 20225 common Java performance problems and how to avoid them using java monitoring toolsJava is one of the most widely used programming languages and it's often used by back-end developers as a...
Applications Manager | September 14, 2022A day for the heroes behind the screenDo you ever wonder how our lives got so easy? We can communicate virtually. We can have any product or service...
Patch Manager Plus | September 14, 2022September 2022 Patch Tuesday comes with fixes for 63 vulnerabilities, including 2 zero daysPatch Tuesday is here again, this time with a plethora of updates. September 2022’s Patch...
AD360 | September 12, 2022Authentication: The first step towards Zero TrustSince the onset of the pandemic, Zero Trust has become a common trend. Unlike traditional...
OpManager | September 12, 2022Linux server monitoring: Long story shortServers are almost inseparable from any IT infrastructure. Linux is the most compatible,...
General | September 9, 2022Five worthy reads: Your data costs you more than you know Illustration by Dhanwant Kumar Five worthy reads is a regular column on five noteworthy...
Log360 | September 9, 2022How to automate incident response and increase security maturity [Webinar]Due to the increase in cyberattacks, security analysts are challenged with multiple...
M365 Manager Plus | September 1, 2022Top five security recommendations for Microsoft 365When the pandemic hit, organizations around the world shifted their infrastructure to...