Latest Posts

Five worthy reads: Are we ready for a passwordless future?

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we explore the possibilities and challenges of a passwordless era.

This past year has been difficult for organizations globally, …

ManageEngine 3 min read Read

Enhance endpoint security for remote workers using holistic UEM [Webinar]

UEM webinar co-hosted by Forrester's Analyst

IT management and endpoint security challenges are arising due to fluctuating work environments. Organizations are now forced to optimize and innovate faster than ever before. With a portion of their workforce returning to offices and another portion continuing to work …

ManageEngine 1 min read Read

 Security operations center, Part 2: Life of a SOC analyst 

In the first part of this blog series, we saw a brief overview of what a security operations center (SOC) is and how it operates. In this part, we’ll take a look at the typical activities that SOC analysts carry …

IT Security 2 min read Read

Streamline project management with advanced analytics for Jira Software

Managing projects isn’t an easy task, particularly if you’re managing parallel projects with inter-team dependencies. Lack of visibility coupled with difficulty in obtaining the right metrics on time can make it nearly impossible for project teams to track issues, action …

Analytics Plus 2 min read Read

Windows network monitoring made easy with OpManager

Windows Network Monitoring - ManageEngine OpManager

Network administrators are responsible for the day-to-day operation of computer networks at organizations of any size and scale. Their primary duty is to manage, monitor, and keep a close watch on the network infrastructure to prevent and minimize downtime. Managing …

OpManager 3 min read Read

Cross Company manages IT efficiently using OpManager’s push notifications and email alerts

Customer stories are one of the best ways for users to get to know a solution or tool and learn how it can solve their problems. By sharing some of our customers’ OpManager success stories, we aim to help new …

OpManager 2 min read Read

Dangerous defaults that put your IT environment at risk: IT security under attack

In this blog in the “IT security under attack” series, we wanted to shed some light on an unfamiliar and seldom discussed topic in IT security: the default, out-of-the-box configurations in IT environments that may be putting your network and …

Log360 5 min read Read

5 trends that will define endpoint management in 2021 and beyond

Endpoint management trends

2020 was a year of tremendous dejection and disruption.

Imagine if you had told your organization’s upper management that they had to switch their 10,000 or 20,000 strong corporate office to the virtual world back in January 2020.

They would …

Desktop Central 2 min read Read

Cyberattack on Florida’s water treatment plant: What it means to global organizations

The recent news of a cyberattack on a water treatment plant carried out by a remote perpetrator came as a shock to organizations around the world.

Earlier this month, an unauthorized threat actor had remotely accessed the plant’s control systems …

PAM360 4 min read Read