Latest Posts

Map the impact of application performance issues on business goals [e-book]

In today’s digital economy, gaining or losing a customer can happen in just seconds. For example, the failure of a single component on an e-commerce website can lead to abandoned shopping carts and loss of sales. According to Google, …

Applications Manager 1 min read

Five worthy reads: How organisations can exploit the potential of enterprise IoT

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we address the steady adoption of IoT across enterprises.

The Internet of Things (IoT) is ultimately all about data, …

General 2 min read

How strong are your passwords?

If you’re in IT, you likely know that you should never use weak passwords to secure your business accounts. However, with the average business user using around 191 passwords, the battle was lost 100 passwords ago. Users cope with …

General 2 min read

Meet your new IT assistant, Zia

As a system administrator, you juggle multiple tasks simultaneously: patching systems, deploying requested software, keeping unauthorized devices out of the network, taking care of licensing, and so on. All this can be a bit too much to handle and …

Desktop Central 2 min read

Remote desktop connection: The key to efficient IT management

Remote desktop connection software

Being in two places at once may be every multitasker’s fantasy, but for many IT pros, being in two places at once is just part of the job. Using a remote desktop connection, IT administrators can be present in both …

General 3 min read

Still troubled by weak passwords in your Windows environment? Join our webinar to learn about strengthening passwords

As an administrator, keeping your Active Directory (AD) environment secure falls on you! Relying on passwords only for authentication is asking for trouble, especially when users set weak passwords like Password@123. Administrators need a way to ensure users are who …

General 1 min read

Microsoft Patch Tuesday updates for March 2019

Zero-day vulnerabilities patched in this month's Patch Tuesday

Microsoft has just released its March installment of Patch Tuesday updates to address 66 vulnerabilities in its applications. Of these 66 vulnerabilities, two are currently being exploited in the wild, 17 are critical, 45 are important, one is moderate, and …

Desktop Central 2 min read

What is remote monitoring and management (RMM)?

Remote monitoring and management (RMM) is the process of tracking, monitoring, and managing endpoints for multiple clients. It is mostly used by managed service providers (MSPs) to provide IT services to organizations who outsource their IT requirements. Two of the …

Desktop Central MSP 2 min read

The what, why, and how of unified endpoint management

 

Unified endpoint management by IT admin

IT management has become a department that exists in every business ecosystem, irrespective of verticals. Those who are responsible for taking care of IT management need to work around the clock to secure and maintain servers, computers, smartphones, tablets, …

Desktop Central 4 min read

Five worthy reads: A look at the healthcare sector’s persistent insider threat

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we explore how insiders have become the biggest threat to healthcare organizations. 

As the number of data breaches and …

ManageEngine 3 min read