2020 was a year of tremendous dejection and disruption.
Imagine if you had told your organization’s upper management that they had to switch their 10,000 or 20,000 strong corporate office to the virtual world back in January 2020.
They would …
2020 was a year of tremendous dejection and disruption.
Imagine if you had told your organization’s upper management that they had to switch their 10,000 or 20,000 strong corporate office to the virtual world back in January 2020.
They would …
A new iOS update, macOS 11 Big Sur, has been released, and it includes several exciting new features. As with most Apple OS upgrades, some users will want to install it immediately, but organizations might want to delay its …
Here is a quick guide of everything you need to know about macOS 11 Big Sur. This successor to macOS 10.15 Catalina is expected to be released to public around September or October this year. This OS update comes with …
The Protection of Personal Information (POPI) Act puts South Africa’s data regulation standards on par with existing data protection laws around the world. It aims to protect personally identifiable information (PII), enforce individuals’ rights to privacy, and provide guidelines for …
We’re thrilled to share that KuppingerCole has recognized ManageEngine Desktop Central as a Leader in the 2020 KuppingerCole Leadership Compass for Unified Endpoint Management (UEM).
Apart from being named an “Overall Leader“, KuppingerCole also recognized ManageEngine as a
The trend of working from home has hit the ground running, and businesses have turned to strategies and tools that will ensure a no-plummet productive environment. There are two major forks in the road when it comes to provisioning remote …
In part one of this two-part blog series, we discussed seven reasons security configurations are an important part of an organization’s security posture. In this part, we’ll look at eight security configurations that can help with ensuring comprehensive control over …
Security configurations are security-specific settings used to secure heterogeneous endpoints such as servers, desktops, laptops, mobile devices, and tablets. As endpoints in your network diversify, securing each endpoint becomes a challenge. One way to ensure effective endpoint security is by …
With remote work being the new normal thanks to the ongoing pandemic, enterprises are facing the dilemma of how to update and secure all their network endpoints while managing devices efficiently.
Many businesses have adapted their operations to a remote …