• Topics
    • Advanced IT analytics
    • General
    • Identity and access management
    • IT operations management and observability
    • Unified service management
    • Unified endpoint management and security
    • Security Information and Event Management

Home / Blog

Key metrics to track to enable remote work and maintain business continuity

General | May 27, 2020

Key metrics to track to enable remote work and maintain business continuity

Remote work has become the new norm. Organizations are adapting to the current volatile...

Five worthy reads: How should your business approach multi-cloud adoption?

General | May 22, 2020

Five worthy reads: How should your business approach multi-cloud adoption?

Five worthy reads is a regular column on five noteworthy items we’ve discovered while...

Cybersecurity use cases for better remote workforce management

General | May 13, 2020

Cybersecurity use cases for better remote workforce management

Credits- Illustrator: S Amirthalingam In the new normal, if your business has chosen...

Five worthy reads: Multiexperience: The next milestone in the digital transformation curve

General | May 8, 2020

Five worthy reads: Multiexperience: The next milestone in the digital transformation curve

Five worthy reads is a regular column on five noteworthy items we’ve discovered while...

General | May 5, 2020

5 major risks that impact vulnerable network devices

Working from home has become our new normal, with many of our jobs being performed...

How to overcome network challenges while working remotely [Webinar]

General | April 29, 2020

How to overcome network challenges while working remotely [Webinar]

COVID-19 has had a ripple effect on organizations, forcing them to accommodate a...

Managing VPN connections will help businesses face today's adversity as well as prepare for tomorrow's opportunity

General | April 23, 2020

Managing VPN connections will help businesses face today's adversity as well as prepare for tomorrow's opportunity

The onslaught of the novel COVID-19 has caught businesses off guard, sending many of...

General | April 21, 2020

SQL Server, Part 2: Authentication and authorization mechanisms in SQL Server, simplified

In the previous blog of this series, we discussed how monitoring SQL Server activities...

Five worthy reads: Implementing a successful remote work environment

General | April 17, 2020

Five worthy reads: Implementing a successful remote work environment

Illustration by Amirthalingam Five worthy reads is a regular column on five noteworthy...

COVID-19 sets the stage for cyberattacks: How to protect your business while working remotely

General | April 15, 2020

COVID-19 sets the stage for cyberattacks: How to protect your business while working remotely

Businesses are shifting their operations to a remote work model in the midst of the...

Patch Tuesday April 2020 comes with fixes for 4 zero-days and 15 critical vulnerabilities

General | April 15, 2020

Patch Tuesday April 2020 comes with fixes for 4 zero-days and 15 critical vulnerabilities

The second Tuesday of the month is upon us, and this translates to only one thing in the...

General | April 10, 2020

Five worthy reads: Keeping a close eye on cybersecurity while working remotely

Five worthy reads is a regular column on five noteworthy items we’ve discovered while...

Page 48 of 85« First«...4647484950...»Last »