Latest Posts

Meet a Major Player of the EMM and UEM industries

We’re thrilled to share that market research firm International Data Corporation (IDC) has recognized Zoho’s IT division—which you know and love as ManageEngine—in two of their latest IDC MarketScape vendor assessment reports.* Based on their research, IDC positioned Zoho/ManageEngine as …

Desktop & Mobile 3 min read

Microsoft Patch Tuesday December 2017 updates

Microsoft Patch Tuesday December 2017

Microsoft Patch Tuesday December 2017 has finally arrived, with a list of 34 critical security updates covering seven different Microsoft products. We know you’re probably ready for some hard-earned time off, but be sure to deploy all of these latest …

Patch Manager Plus 2 min read

Prevent remote code execution by disabling Microsoft’s Equation Editor now

MS Office Equation Editor breach

While many of us are looking forward to some well-earned time off, cyber attacks aren’t taking any breaks this holiday season. In late November, Cobalt Cybercriminal Group took advantage of a 17-year-old vulnerability in Microsoft Office’s Equation Editor, the CVE-2017-11882 …

Desktop Central 2 min read

TeamViewer hacked: Here’s how to protect your systems

TeamViewer hacked

After reports of a serious bug, the developers behind the popular remote desktop management software TeamViewer has released an important patch to seal this vulnerability. Since TeamViewer allows users to share what’s displayed on their desktops with anyone in …

Patch Manager Plus 2 min read

Create flexible alerts with AlarmsOne’s all-new Alarm Modifier

In our never-ending quest to find ways to curb alert noise, we’ve come up with some amazing features for AlarmsOne. Sure, features like noise reduction and multi-criteria alerting help cut down on noise, but to step up our game a …

AlarmsOne 2 min read

Common mistakes administrators make when applying GPOs – Part 1

Active Directory (AD) and Group Policy (GP) are essential components of most enterprises, so it goes without saying that making changes to AD and GP should be done with care. Thus,over the next few blogs I will be covering common …

Active Directory 1 min read

5 building blocks for seamless endpoint security

Endpoint security tips

Enterprise security has become a top priority with the recent spike in cyber attacks. With so many tasks piling up for IT administrators, many are left with a minimum amount of time to check on IT security. Unfortunately not all …

Desktop Central 3 min read

Our new privileged identity management suite is now available!

Yes! We just launched our new privileged identity management (PIM) suite, an enterprise-grade, all-inclusive solution that enables IT admins to discover, store, control, and monitor all privileged identities from a single, unified platform. Before we tell you more about …

IT Security 3 min read

How SIEM can help with auditing and compliance

Recent cyber breaches and tighter compliance regulations are pushing businesses to invest more heavily in IT security. You and your organization may very well be in the process of assessing your defenses and planning a clear security strategy. If that’s …

IT Security 2 min read