Latest Posts

Five worthy reads: How secure is your smart voice assistant? 

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we take a look at the security implications that come with the rise of smart voice assistants.

“Hey Siri.”…

ManageEngine 3 min read

Free webinar: Learn how to protect your enterprise from ransomware 

What’s the first thing that comes to mind when you think about ransomware defense? Patching? Regular backups? Patching is a must if you want to ensure your systems are running the latest software, while taking backups of your sensitive data …

DataSecurity Plus 1 min read

[Free webinar] Log in just once to access over 100 enterprise applications

Did you know that over 70 percent of users have more than 10 passwords to remember? Password overload is real and it could be creeping into your organization’s productivity. End users often mix up passwords and find themselves locked out …

General 1 min read

Applications Manager training recap: Week 2, Improving end-user experience

We hosted the second session of our free, four-part Applications Manager training series on June 13th. In this webinar, our product experts shared insights on how users can improve end-user experience for web applications and websites with our End User …

Applications Manager 1 min read

Free webinar: Tracking Active Directory attacks and user logons

Microsoft Active Directory is the center of most enterprises’ network identity management. Being able to track how Active Directory user accounts are accessed and used is a key aspect of securing access to network resources. As an administrator, you need …

Active Directory 1 min read

Microsoft Patch Tuesday June 2018 Updates

Microsoft has announced its Patch Tuesday updates for June, and this month’s list of patches comes with 50 security fixes. Thankfully there are no Windows zero-day fixes this month, but Microsoft has patched CVE-2018-8267, a remote code execution vulnerability …

Desktop Central 2 min read

Applications Manager training recap: Week 1, Discover and visualize application dependencies

On June 6th, our product experts hosted the first session of our free, four-part Applications Manager training series. In this webinar, we shared insights on how you can discover and map relationships between applications and monitor a wide range of …

Applications Manager 1 min read

Five worthy reads: Does your security operations center really make you immune to cyberattacks?

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we highlight the importance of following cybersecurity standards to build a solid security operations center.

Many enterprises are at …

General 2 min read

O’Reilly Velocity Conference 2018 – Tutorials, sessions, and a lot of fun!

One of our favorite tech events is back. In its eleventh year, the O’Reilly Velocity Conference offers IT professionals a chance to network with experts from various disciplines, such as engineering, operations, and DevOps. The event kick-starts on June 11th …

Applications Manager 1 min read

Selecting an IAM solution that fits your enterprise

When it comes to managing the identity and access of users, Active Directory leaves a few gaps. These gaps can impact everything from user productivity to corporate security. This is where third-party identity and access management (IAM) tools come into …

Active Directory 2 min read