Latest Posts

Five worthy reads: Preparing for AI adoption amidst a serious skills shortage

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. In the era of mass AI adoption, aimed at enabling disruptive technology innovations, this week we will explore the concern …

ManageEngine 3 min read Read

Microsoft’s shared responsibility model: Who should back up Azure AD and Microsoft 365 data? [E-book]

 

Use of Azure AD and Microsoft 365 has steadily increased over the past few years, and the adoption rate has skyrocketed due to the COVID-19 pandemic. While Microsoft focuses on providing users with nearly 100% uptime, the shared responsibility …

RecoveryManager Plus 1 min read Read

The Colonial Pipeline hack uncovered: FBI- and CISA-recommended security measures

The Colonial Pipeline ransomware attack is potentially one of the worst cyberattacks to have happened this decade. A hacker group known as DarkSide stole nearly 100GB of data from the Colonial Pipeline servers before locking them down and demanding a …

General 2 min read Read

Shared iPads at work: How MDM helps you get the most out of them

For organizations to know that iPads can now be used as shared devices in different industries.Many organizations allow their corporate devices to be shared by different employees, or hand them out to teams or departments on a rotating basis. Healthcare providers, logistics companies, retailers, and schools often deploy mobile devices that are shared to ease …

Mobile Device Manager Plus 3 min read Read

ManageEngine captures top honors at GovTech Innovation Awards 2021

ManageEngine captured the Network Management & Monitoring Vendor of the Year honor at the GovTech Innovation Awards 2021 conducted by Tahawul Tech. Elitser Technologies, a regional distributor for ManageEngine, accepted the award on behalf of ManageEngine on September 27 in …

ManageEngine 2 min read Read

Watch out for tenants living off your land

The cyberworld has witnessed and defended against several forms of attacks. Some of the most common ones known to disrupt a network include credential stealing, malware installations, worms and viruses, and insider threats. In order to execute these attacks successfully, …

IT Security 3 min read Read

Network monitoring tools: The good, the bad, and the ugly

For organizations that rely on their network to support their daily operations, how well the network operates can make or break their business. As a network admin, your core objective is to ensure that day-to-day business operations are carried out …

General 6 min read Read

October 2021 Patch Tuesday fixes 81 vulnerabilities, including 4 zero-days

An IT admin’s true nightmare is unpatched vulnerabilities, which is why Patch Tuesdays are crucial. The ante penultimate Patch Tuesday in 2021 comes with fixes for 81 vulnerabilities, including Microsoft Edge for Chromium’s updates, out of which three are

Patch Manager Plus 4 min read Read

How to gain holistic visibility into a modern application environment [Webinar]


The average cost of downtime is $5,600 to $9,000 per minute according to a report from Ponemon Institute.

When business-critical applications fail, the consequences can be disastrous. System downtime and poor application performance can impact a business in a variety …

Applications Manager 1 min read Read