• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Latest Stories

AD360 | October 28, 2021

Ransomware: How attackers weaponize Active Directory, and what defense measures can stop them [Free e-book]

Ransomware attacks continue to rattle organizations across the globe. Especially worrisome is the fact that many of them are exploiting Active...

WWDC21 update: macOS 12 Monterey is here with features that can simplify your life as an admin

Endpoint Central | October 27, 2021

WWDC21 update: macOS 12 Monterey is here with features that can simplify your life as an admin

The iOS, iPadOS, and tvOS 15 updates released last month provided some noteworthy improvements to...

Five worthy reads: Preparing for AI adoption amidst a serious skills shortage

General | October 22, 2021

Five worthy reads: Preparing for AI adoption amidst a serious skills shortage

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and...

Microsoft

RecoveryManager Plus | October 21, 2021

Microsoft's shared responsibility model: Who should back up Azure AD and Microsoft 365 data? [E-book]

Use of Azure AD and Microsoft 365 has steadily increased over the past few years, and the adoption rate...

Featured

ServiceDesk Plus

[Watch now] Supercharging ITSM with ITOM integration

ServiceDesk Plus

[Free e-book] ITSM doesn’t have to be a struggle—simplify it with ITOM integration

CloudSpend

AWS Lambda’s INIT billing update: What’s changing and why it matters for your cloud costs

ITOM-ITSM integration webinar

ServiceDesk Plus

[Webinar] ITOM and ITSM: A unified approach to incident, asset, and change management

General

Top tips: Keep AI chatbots out of your business!

The Colonial Pipeline hack uncovered: FBI- and CISA-recommended security measures

General | October 20, 2021

The Colonial Pipeline hack uncovered: FBI- and CISA-recommended security measures

The Colonial Pipeline ransomware attack is potentially one of the worst cyberattacks to...

Shared iPads at work: How MDM helps you get the most out of them

Mobile Device Manager Plus | October 18, 2021

Shared iPads at work: How MDM helps you get the most out of them

Many organizations allow their corporate devices to be shared by different employees, or...

ManageEngine captures top honors at GovTech Innovation Awards 2021

General | October 15, 2021

ManageEngine captures top honors at GovTech Innovation Awards 2021

ManageEngine captured the Network Management & Monitoring Vendor of the Year honor at...

Security Information and Event Management | October 14, 2021

Watch out for tenants living off your land

The cyberworld has witnessed and defended against several forms of attacks. Some of the...

Network monitoring tools: The good, the bad, and the ugly

General | October 13, 2021

Network monitoring tools: The good, the bad, and the ugly

For organizations that rely on their network to support their daily operations, how well...

Patch Manager Plus | October 13, 2021

October 2021 Patch Tuesday fixes 81 vulnerabilities, including 4 zero-days

An IT admin’s true nightmare is unpatched vulnerabilities, which is why Patch Tuesdays are...

Discover more

Featured

ServiceDesk Plus

[Watch now] Supercharging ITSM with ITOM integration

ServiceDesk Plus

[Free e-book] ITSM doesn’t have to be a struggle—simplify it with ITOM integration

CloudSpend

AWS Lambda’s INIT billing update: What’s changing and why it matters for your cloud costs

ITOM-ITSM integration webinar

ServiceDesk Plus

[Webinar] ITOM and ITSM: A unified approach to incident, asset, and change management

General

Top tips: Keep AI chatbots out of your business!