• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Latest Stories

Guide to keeping cyber insurance premiums low amidst rising threats

General | August 5, 2022

Guide to keeping cyber insurance premiums low amidst rising threats

Cyberattacks have become an unavoidable part of the technology landscape in recent years with attacks like ransomware, phishing, and whaling reaching...

Automated incident response using Log360

Log360 | August 4, 2022

Automated incident response using Log360

Security teams are often overwhelmed with alerts daily, including false positives, and actions that require...

How a global leader in car audio technology reduced its downtime by 40% in 8 months with Applications Manager

Applications Manager | August 3, 2022

How a global leader in car audio technology reduced its downtime by 40% in 8 months with Applications Manager

As a pioneer of audio electronics solutions for all in-vehicle communication demands, this organization has...

Lightweight Directory Access Protocol (LDAP) decoded for beginners

Identity and access management | August 2, 2022

Lightweight Directory Access Protocol (LDAP) decoded for beginners

If you are a beginner on your Active Directory (AD) learning journey, then you must have stumbled upon the...

Featured

ServiceDesk Plus

[Watch now] Supercharging ITSM with ITOM integration

ServiceDesk Plus

[Free e-book] ITSM doesn’t have to be a struggle—simplify it with ITOM integration

CloudSpend

AWS Lambda’s INIT billing update: What’s changing and why it matters for your cloud costs

ITOM-ITSM integration webinar

ServiceDesk Plus

[Webinar] ITOM and ITSM: A unified approach to incident, asset, and change management

General

Top tips: Keep AI chatbots out of your business!

Five worthy reads: Privacy vs. monetization

General | July 29, 2022

Five worthy reads: Privacy vs. monetization

Five worthy reads is a regular column on five noteworthy items we’ve discovered while...

A practical approach to Active Directory Domain Services, Part 10: A study into Group Policies and AD

Identity and access management | July 26, 2022

A practical approach to Active Directory Domain Services, Part 10: A study into Group Policies and AD

We have covered a plethora of topics on Active Directory (AD) in parts one to nine of...

Checksum: How does it ensure security for your vital data?

Network Configuration Manager | July 25, 2022

Checksum: How does it ensure security for your vital data?

A checksum is small code of computed information that deals with data integrity and...

Active Directory sites in a nutshell

Identity and access management | July 25, 2022

Active Directory sites in a nutshell

An Active Directory (AD) environment has things like forests, trees, domains,...

Info-Tech Research report 2022: 98% of customers say they love OpManager!

OpManager | July 22, 2022

Info-Tech Research report 2022: 98% of customers say they love OpManager!

Choosing the best network monitoring tool can be mind boggling. Today, network admins need...

Cybersecurity compliance: Time to clean up the cobwebs

IT Security | July 22, 2022

Cybersecurity compliance: Time to clean up the cobwebs

Cybersecurity compliance became prominent in the last decade. From being a trivial part...

Discover more

Featured

ServiceDesk Plus

[Watch now] Supercharging ITSM with ITOM integration

ServiceDesk Plus

[Free e-book] ITSM doesn’t have to be a struggle—simplify it with ITOM integration

CloudSpend

AWS Lambda’s INIT billing update: What’s changing and why it matters for your cloud costs

ITOM-ITSM integration webinar

ServiceDesk Plus

[Webinar] ITOM and ITSM: A unified approach to incident, asset, and change management

General

Top tips: Keep AI chatbots out of your business!