Blog archives

The states of data, Part 2: Why visibility is key for protecting data at rest

In part two of our blog series, The states of data, we’ll be discussing the various threats to sensitive data at rest in the form...

DataSecurity Plus 4 min read Read

Top 10 cybersecurity misconfigurations and how to avoid them

Have you ever heard of the 80/20 rule? The 80/20 rule, also known as the Pareto principle, was named after the Italian economist Vilfredo Pareto....

Log360 5 min read Read

Introducing the Zia Code Generator for Custom Functions in the cloud version of ServiceDesk Plus

We are thrilled to announce the latest GenAI capability in the cloud version of ServiceDesk Plus: Zia Code Generator for Custom Functions, powered by ChatGPT....

General , ITIL , ManageEngine , ServiceDesk Plus 1 min read Read

Supercharge ITSM with OpManager: A webinar on a seamless integration of ITOM and ITSM

Are you frustrated with outdated IT asset data during audits and sluggish incident response times? Let me quickly walk you through the consequences of inadequate...

ServiceDesk Plus 2 min read Read

Top tips: Four ways organizations can reduce their attack surface

Top tips is a weekly column where we highlight what’s trending in the tech world today and list ways to explore these trends. This week,...

General 2 min read Read

Supporting your remote workforce: Automatic cached credentials update

In today’s increasingly remote work environment, IT administrators face the challenge of ensuring end users can securely and seamlessly access company resources from anywhere. A...

ADSelfService Plus 2 min read Read

McLarens achieves 24/7 availability and uptime with Applications Manager

Uptime and IT resources availability are critical metrics for maintaining efficiency, flexibility, and scalability in the financial services industry. The continuous operation of financial technology...

General 2 min read Read

The states of data, Part 1: Why you should protect data at rest, in use, and in motion

What do Morgan Stanley, Samsung, and a New York credit union all have in common? They aren’t of the same scale, do not cater to...

DataSecurity Plus 2 min read Read

The HIPAA compliance checklist for security managers

The healthcare sector in the United States has seen a continuous increase in both the frequency and cost of data breaches in the past decade....

Log360 3 min read Read