• Topics
    • Advanced IT analytics
    • Application Performance
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Product:General

How to overcome network challenges while working remotely [Webinar]

General | April 29, 2020

How to overcome network challenges while working remotely [Webinar]

COVID-19 has had a ripple effect on organizations, forcing them to accommodate a...

Managing VPN connections will help businesses face today's adversity as well as prepare for tomorrow's opportunity

General | April 23, 2020

Managing VPN connections will help businesses face today's adversity as well as prepare for tomorrow's opportunity

The onslaught of the novel COVID-19 has caught businesses off guard, sending many of...

General | April 21, 2020

SQL Server, Part 2: Authentication and authorization mechanisms in SQL Server, simplified

In the previous blog of this series, we discussed how monitoring SQL Server activities...

Five worthy reads: Implementing a successful remote work environment

General | April 17, 2020

Five worthy reads: Implementing a successful remote work environment

Illustration by Amirthalingam Five worthy reads is a regular column on five noteworthy...

COVID-19 sets the stage for cyberattacks: How to protect your business while working remotely

General | April 15, 2020

COVID-19 sets the stage for cyberattacks: How to protect your business while working remotely

Businesses are shifting their operations to a remote work model in the midst of the...

Patch Tuesday April 2020 comes with fixes for 4 zero-days and 15 critical vulnerabilities

General | April 15, 2020

Patch Tuesday April 2020 comes with fixes for 4 zero-days and 15 critical vulnerabilities

The second Tuesday of the month is upon us, and this translates to only one thing in the...

General | April 10, 2020

Five worthy reads: Keeping a close eye on cybersecurity while working remotely

Five worthy reads is a regular column on five noteworthy items we’ve discovered while...

Security tips for work-from-home organizations [Webinar]

General | April 9, 2020

Security tips for work-from-home organizations [Webinar]

Many organizations including Google, Amazon, Zoho, and Twitter have adopted remote...

File shadowing: The key to a swift recovery from USB and file-based attacks

General | April 8, 2020

File shadowing: The key to a swift recovery from USB and file-based attacks

USB devices are undeniably valuable, but they can be dangerous. On one hand, they are...

COVID-19: Remote patch management struggles and solutions to secure remote users

General | April 6, 2020

COVID-19: Remote patch management struggles and solutions to secure remote users

Crisis or not, keeping endpoints patched against known and emerging vulnerabilities...

Best practices to ensure data security while working remotely

General | April 2, 2020

Best practices to ensure data security while working remotely

Coronavirus has disrupted daily life for so many around the world in a shockingly short...

Remote work: Being productive in a pandemic

General | March 27, 2020

Remote work: Being productive in a pandemic

With coronavirus (COVID-19) wreaking havoc across the globe, its disastrous effects are...

Page 44 of 1«...4243444546...»Last »