• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Author:Sathya R

  • Sathya R
    Sathya R

    Device Control Plus | August 17, 2020

    Promote productivity without compromising on security through role-based access control

    An organization is similar to an intricate ecosystem; each department is in charge of a...

    File shadowing: The key to a swift recovery from USB and file-based attacks

    General | April 8, 2020

    File shadowing: The key to a swift recovery from USB and file-based attacks

    USB devices are undeniably valuable, but they can be dangerous. On one hand, they are...

    Patch Manager Plus | February 12, 2020

    Microsoft's February Patch Tuesday comes with fixes for 99 vulnerabilities

    This Patch Tuesday, a total of 99 vulnerabilities have been addressed, making the February...

    A catastrophic flaw in Linux sudo command with a simple fix using Desktop Central

    Endpoint Central | October 16, 2019

    A catastrophic flaw in Linux sudo command with a simple fix using Desktop Central

    A critical vulnerability in sudo has been disclosed, that when exploited, enables users to...