Latest Posts

[Free webinar]  ITSM metrics vs ITSM analytics: What it takes to connect the dots in your IT support 

Lost business hours, change success rate, first call resolution rate, and SLA compliance rate are some of the key metrics that help improve the quality of service delivery. Metrics like these help find answers to the question: “What’s wrong

ServiceDesk Plus 1 min read

Survey reveals 82 percent of ITSM professionals believe IT jobs will get harder

As an ITSM professional focused on consistently providing quality service, its easy for certain things to slip your mind. For example, have you ever thought that recent newsworthy events could even remotely affect your job? Headlines like

Help Desk 1 min read

Office 365 help desk delegation with O365 Manager Plus

While Office 365 lets you work from anywhere around the globe, the management features it provides are often insufficient. When an organization is spread across multiple countries, it’s difficult for one administrator to single-handedly manage every user and mailbox.


O365 Manager Plus 2 min read

Security breach! Get the AD protection you needed…yesterday

Security. This word has become more important now than ever, especially with recent news of ransomware attacks such as WannaCry. And while you’re thinking about security, don’t forget about identity access management (IAM). Without an effective IAM plan, your company

ManageEngine 2 min read

ManageEngine ranked second in Capterra’s list of top 20 ITAM software

Capterra, a leading web-based service that helps users find the best software in the market, frequently publishes reports on the top software in a particular field. We’re happy to announce that we were just ranked number two in Capterra’s list

ManageEngine 2 min read

5 crucial facts that you must know about identity and access management

IAM is IT-centric.

Identity and access management (IAM) may appear easy to some, but in reality, it is very tricky. Proper IAM is the key to a healthy environment because it provides the ability to create, manage, and delete objects. …

AD360 4 min read

Six reasons why snapshots can’t replace virtual machine backups

What is a snapshot?

A snapshot captures the active configuration, memory, and storage system of a virtual machine. Any change made to VMs after a snapshot is created is written on the snapshot while the actual VM hard disk

RecoveryManager Plus 3 min read

Single sign-on (SSO) for the cloud

Nearly every organization has some cloud-based application. Of course the common cloud apps include Microsoft Azure, Office 365, G Suite, those from Zoho and Salesforce, and more. As administrators, we want to make our jobs more efficient and we also …

ADSelfService Plus 1 min read

Prevent CowerSnail network breaches with the right patch management solution. 

It’s hard to keep note of all the malware that‘s been unleashed in last three months; the count seems to be never ending. Earlier this year, we saw SambaCry exploit a sevenyearold

Desktop Central 2 min read

Defeat IT security threats at our NYC User Conference

For the IT world, summer vacation has been cut short this year due to recent ransomware and malware attacks. WannaCry jump-started the security frenzy in May, when over 400,000 machines were infected with ransomware that exploited a

ManageEngine 2 min read