The comprehensive guide to managing your network configurations

Configurations are an integral part of network devices, and it’s important to keep a watchful eye on these configurations to ensure networks function seamlessly. However, pouring over configurations can be quite a time-consuming...

General 1 min read Read

Sizing up the CCPA: How the USA’s new privacy regulation measures up against the GDPR 

The California Consumer Protection (CCPA) act took effect on January 1, 2020, and companies across the globe are scrambling to get their act together to...

General 3 min read Read

Five worthy reads: Mastering cybersecurity with AI and machine learning

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we discuss the escalating...

General 2 min read Read

How to build a successful ITSM practice

Imagine you’re in an IT service desk team facing one of the following situations: 1. A major incident impacts your service availability and brings down half...

General 1 min read Read

Five worthy reads: The road to empowering employees through data democratization

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. In the first Five worthy reads of...

General 3 min read Read

The Vanadium: Windows 10 1909 feature pack rollout

The bi-annual feature update of Windows 10 has officially rolled out to mainstream users. With all the prerequisites met, the feature pack can be automatically downloaded and synchronized from...

General 1 min read Read

Five worthy reads: Insider threats—what’s in the cards for 2020? 

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we explore the growing...

General 2 min read Read

Efficient ways to manage and secure your Active Directory environment [Free webinar]

Enterprises face many different challenges when it comes to managing their Windows Active Directory (AD) environment and implementing security best practices. As high-profile breaches continue...

General 1 min read Read

Stopping shadow IT from looming over the cloud

After ages of struggling to get VPNs to reach work resources remotely, none of us could have dreamt of the sheer simplicity cloud applications are offering us right...

General 2 min read Read