Latest Posts

Five reasons to choose Log360, part 1: User-friendly deployment and UI

SIEM solutions are a must-have in any organization’s security toolkit. They allow you to analyze events from your network, gain actionable insights into network activity, and detect and mitigate data breaches and other security incidents, all while remaining compliant with …

Log360 2 min read Read

Five worthy reads: Should NoOps be your new operations strategy?

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we discuss whether NoOps is just a buzzword, a far-fetched reality, or simply the next evolutionary state of DevOps.

General 3 min read Read

Reported vulnerability in Evernote Web Clipper exposes browsing data of millions of users

A critical vulnerability in Evernote’s Web Clipper Chrome extension recently allowed hackers to steal data present in active web sessions. Web Clipper, an extension that allows users to save screenshots of webpages, emails, images, articles, etc., had a vulnerability that …

Browser Security Plus 2 min read Read

Boost your organization’s productivity with these 5 password management techniques

For some time now, many organizations have claimed they’d go password-less. Even tech giants like Google and Microsoft want to kill passwords. Yet, almost two decades later, passwords remain the primary form of authentication in Gmail, Outlook, and other …

General 2 min read Read

Helping IT admins tackle commonly encountered web application issues

Unless there’s been a huge breakthrough in technology that proves beneficial to employees, or something goes wrong that affects the business’ typical work processes, IT teams’ efforts often go unnoticed. Since significant breakthroughs are few and far between, more …

Applications Manager 3 min read Read

Mobile Device Manager Plus is here to make your service desk more efficient

On an average day, help desk technicians battle against forgotten passwords, never-ending updates, and misplaced devices. This incessant inflow of mundane tickets can allow business-critical issues to slip under technicians’ radar. What if there was a solution to reduce the …

Mobile Device Manager Plus 2 min read Read

Microsoft Patch Tuesday June 2019: 88 vulnerabilities to fix, but how?

Every Patch Tuesday is a nightmare for IT admins, loading them with a bundle of updates, leaving them no respite for the rest of the week. This June Patch Tuesday is no exception, with a huge amount of patches released …

Desktop Central 2 min read Read

ManageEngine recognized as a May 2019 Gartner Peer Insights Customers’ Choice for Network Performance Monitoring and Diagnostics Software

2019 continues to be a great year for ManageEngine accolades. This time, we are proud to announce that we’ve been named a May 2019 Gartner Peer Insights Customers’ Choice for Network Performance Monitoring and Diagnostics Software. The consistent performance of …

OpManager 2 min read Read

[Infographic]Top three approaches to dealing with account lockouts

In the previous blog of this series, “[Infographic]Three tips to simplify Active Directory compliance and auditing”, we discussed the tips and tricks to achieve compliance. In this blog, let’s discuss what admins must focus on when dealing with account …

Active Directory 2 min read Read

Five worthy reads: Fend off cyberattacks using dark web intelligence

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we discuss how organizations can use the dark web to build a treasure trove of actionable intelligence to prevent

ManageEngine 3 min read Read