Security configurations—Part two: 8 imperative security configurations for your arsenal

In part one of this two-part blog series, we discussed seven reasons security configurations are an important part of an organization’s security posture. In this part, we’ll look at eight security configurations that can help with ensuring comprehensive control over …

Desktop Central 3 min read Read

Security configurations—Part one: 7 reasons why security configurations are crucial to your security blueprint

Security configurations are security-specific settings used to secure heterogeneous endpoints such as servers, desktops, laptops, mobile devices, and tablets. As endpoints in your network diversify, securing each endpoint becomes a challenge. One way to ensure effective endpoint security is by …

Desktop Central 3 min read Read

Remote work: Governing and guiding end users

Desktop Central Remote Work User announcementsWith remote work being the new normal thanks to the ongoing pandemic, enterprises are facing the dilemma of how to update and secure all their network endpoints while managing devices efficiently.

Many businesses have adapted their operations to a remote …

Desktop Central 3 min read Read

What is modern management, and how will it revolutionize enterprise IT management?

What is modern management

IT departments have experienced numerous changes in the way they manage and control user devices. Starting with the traditional CRT monitor-based computers, to modern smartphones, technological developments have been remarkable. Additionally, with the COVID-19 pandemic, employees are restricted to work …

Desktop Central 5 min read Read

March Patch Tuesday 2020 resolves 115 CVEs from Microsoft, and 12 CVEs from Firefox

It’s that time of the month when IT admins are glued to their systems again. Why? March Patch Tuesday is here. Microsoft has patched 115 CVEs. Of these, 26 are listed as Critical, 88 as Important, and one as Moderate …

Desktop Central 3 min read Read

ManageEngine recognized for unified endpoint management at RSA Conference 2020

InfoSec Awards 2020

“We’re thrilled to name ManageEngine a winner of the Unified Endpoint Management category in our InfoSec Awards program. They won this award because they pioneered endpoint security management – an innovative approach to defeating the next generation of cybercriminals,” said

Desktop Central 2 min read Read

Key security functions of unified endpoint management

As part of digital transformation, the adoption of a wide range of devices for work is on the rise. A unified endpoint management (UEM) solution is capable of enforcing management policies and configurations, as well as securing endpoints. In a …

Desktop Central , ManageEngine UEM 4 min read Read

Meet a Major Player in the UEM and EMM industries

We are delighted to share that market research and advisory firm, IDC, has recognized Zoho/ManageEngine in the following three IDC MarketScape reports:

  1. Worldwide Unified Endpoint Management Software 2019–2020 Vendor Assessment (Doc #US45355119, November 2019),
  2. Worldwide Enterprise Mobility Management Software 2019-2020

Desktop Central 3 min read Read

9 essential UEM capabilities that empower your IT administration

Unified endpoint management (UEM) is an IT best practice and strategy for securing and controlling desktop computers, laptops, smartphones, and tablets in a connected, secure manner from a single console. It’s increasingly important for enterprises today because of the prevalence …

ManageEngine UEM 3 min read Read