Blog archives

Unveiling the cloud version of ManageEngine AssetExplorer, our enterprise IT asset management platform

  We are thrilled to introduce the cloud version of our comprehensive ITAM platform, ManageEngine AssetExplorer. The on-demand version of AssetExplorer offers IT managers the...

AssetExplorer , General , ManageEngine 2 min read Read

Five worthy reads: Cyberattacks in the banking industry

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we explore cyberattacks in...

General 3 min read Read

Top tips: Leveraging blockchain technology beyond just crypto

Top tips is a weekly column where we highlight what’s trending in the tech world today and list out ways to explore these trends. This...

General 3 min read Read

9,000 IPs managed, $113,000 saved annually: Here’s how an Australian semiconductor manufacturer does it

With a global market exceeding $500 billion, semiconductors are the driving force behind modern technology. From everyday devices to critical industries, the tiny chips produced...

OpUtils 2 min read Read

Unlocking cloud visibility with CloudSpend’s Cost Category report

Cloud costs can quickly spiral out of control without a proper understanding of where the money is being spent. AWS offers a tool called Cost...

CloudSpend 3 min read Read

Sequoia spotlight: Deploying the newest macOS with Endpoint Central

Apple released its new macOS Sequoia 15.0 on Sept. 16, and we at ManageEngine are excited to announce our support from the day of its...

Endpoint Central , Mobile Device Manager Plus 2 min read Read

Why educational institutions need robust cybersecurity solutions

Technology has been an integral part of the education industry, even before the onset of the pandemic. However, the shift from traditional classrooms to online...

Active Directory , ADManager Plus 3 min read Read

The states of data, Part 2: Why visibility is key for protecting data at rest

In part two of our blog series, The states of data, we’ll be discussing the various threats to sensitive data at rest in the form...

DataSecurity Plus 4 min read Read

Top 10 cybersecurity misconfigurations and how to avoid them

Have you ever heard of the 80/20 rule? The 80/20 rule, also known as the Pareto principle, was named after the Italian economist Vilfredo Pareto....

Log360 5 min read Read