• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Product:General

Five worthy reads: Privacy in pandemic management

General | June 12, 2020

Five worthy reads: Privacy in pandemic management

Five worthy reads is a regular column on five noteworthy items we have discovered while...

Your return-to-the-office cybersecurity checklist

General | June 2, 2020

Your return-to-the-office cybersecurity checklist

The novel COVID-19 pandemic has changed the way organizations work. The sudden transition...

ISO/IEC 20000 certification: What it is, why your organization needs it, and how to get it

General | May 28, 2020

ISO/IEC 20000 certification: What it is, why your organization needs it, and how to get it

One of the most important things that customers consider while purchasing a product or...

Key metrics to track to enable remote work and maintain business continuity

General | May 27, 2020

Key metrics to track to enable remote work and maintain business continuity

Remote work has become the new norm. Organizations are adapting to the current volatile...

Five worthy reads: How should your business approach multi-cloud adoption?

General | May 22, 2020

Five worthy reads: How should your business approach multi-cloud adoption?

Five worthy reads is a regular column on five noteworthy items we’ve discovered while...

Cybersecurity use cases for better remote workforce management

General | May 13, 2020

Cybersecurity use cases for better remote workforce management

Credits- Illustrator: S Amirthalingam In the new normal, if your business has chosen...

Five worthy reads: Multiexperience: The next milestone in the digital transformation curve

General | May 8, 2020

Five worthy reads: Multiexperience: The next milestone in the digital transformation curve

Five worthy reads is a regular column on five noteworthy items we’ve discovered while...

General | May 5, 2020

5 major risks that impact vulnerable network devices

Working from home has become our new normal, with many of our jobs being performed...

How to overcome network challenges while working remotely [Webinar]

General | April 29, 2020

How to overcome network challenges while working remotely [Webinar]

COVID-19 has had a ripple effect on organizations, forcing them to accommodate a...

Managing VPN connections will help businesses face today's adversity as well as prepare for tomorrow's opportunity

General | April 23, 2020

Managing VPN connections will help businesses face today's adversity as well as prepare for tomorrow's opportunity

The onslaught of the novel COVID-19 has caught businesses off guard, sending many of...

General | April 21, 2020

SQL Server, Part 2: Authentication and authorization mechanisms in SQL Server, simplified

In the previous blog of this series, we discussed how monitoring SQL Server activities...

Five worthy reads: Implementing a successful remote work environment

General | April 17, 2020

Five worthy reads: Implementing a successful remote work environment

Illustration by Amirthalingam Five worthy reads is a regular column on five noteworthy...

Page 46 of 83« First«...4445464748...»Last »