Five worthy reads: Embracing Zero Trust during a pandemic

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. With the rising concern over cybersecurity in remote work, this week we explore the concept of the Zero Trust model in

General 3 min read Read

How to track down network faults, combat threats, and accelerate network performance to bolster your remote workforce [Webinar]

Network security webinar

With remote work quickly becoming the new norm, the business landscape is facing an entirely new set of challenges. Organizations are scrambling to steer clear of the unprecedented roadblocks that remote work has brought about. The work-from-home policies intended to …

General 1 min read Read

Launching Desktop Central Cloud: Embrace UEM the SaaS way!

Desktop Central is a holistic unified endpoint management (UEM) solution that offers a dynamic approach to securing and managing user devices, including desktops, laptops, smartphones, and tablets.

KuppingerCole has recognized ManageEngine Desktop Central as a Leader in its 2020 Leadership

General 1 min read Read

Leveraging IoT to target pain points in the healthcare industry

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. Most healthcare facilities already use the Internet of Things (I0T) to make their environment a more efficient and safer place, and

General 3 min read Read

SQL Server, Part 4: Understanding built-in SQL Server principals

In the previous blog in this series, we discussed the principle of least privilege, and the importance of assigning bare minimum privileges to users and systems at database or server levels. However, there are certain built-in principals in your …

General 3 min read Read

Five worthy reads: Privacy in pandemic management

Five worthy reads is a regular column on five noteworthy items we have discovered while researching trending and timeless topics. This week, we explore the data privacy challenges and concerns that have arisen during the COVID-19 pandemic. 

In the wake …

General 2 min read Read

Your return-to-the-office cybersecurity checklist

The novel COVID-19 pandemic has changed the way organizations work. The sudden transition to remote work has forced organizations to look for temporary fixes to bridge the gap, leaving their endpoints exposed to an unprecedented threat landscape. Insecure internet connections, …

General 4 min read Read

Key metrics to track to enable remote work and maintain business continuity

remote working metrics

Remote work has become the new norm. Organizations are adapting to the current volatile market conditions by amending their business strategies, drafting new business playbooks, and laying down novel policies, all centered around one theme: remote work.

This transition to

General 3 min read Read

Five worthy reads: How should your business approach multi-cloud adoption?

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. In this edition, we’ll learn about the multi-cloud strategy, why you should consider it and how to implement it in your

General 3 min read Read