Blog archives

[Webinar] How to implement an effective data loss prevention strategy

Data is your organization’s lifeblood. Ensuring it doesn’t fall into the wrong hands must be a top priority. Data security is a continuous process where you’ll...

Log360 2 min read Read

Top tips: What AI-powered security risks should you keep an eye out for?

We’ve all heard the cliché, “Change is the only constant.” Sure, it’s been overused to a point where it may have lost its meaning, but...

General 3 min read Read

Streamline incident management with OpManager and PagerDuty

During IT incident management, if there is one process where effective communication makes all the difference, it’s incident triage. In sending alert notifications, configuring escalation...

General 2 min read Read

ManageEngine CloudSpend has launched its Reports feature: See what’s new

ManageEngine CloudSpend, a cloud cost management tool, is excited to announce the release of its new, Reports feature. CloudSpend’s Reports feature automates report generation for...

CloudSpend 3 min read Read

O que é a ISO 27001 e porque ela é importante

A grade de normas ISO 27000 atua como uma estrutura de gerenciamento de segurança da informação para instituições no mundo todo. Quando as empresas seguem...

Log360 , Portugues 5 min read Read

Bugged by vulnerabilities? This is what you need

Twenty-five percent: Any idea what this percentage is referring to? Let’s take some wild guesses: A five-year CAGR of your investments? Your yearly salary hike? If...

Patch Manager Plus 3 min read Read

Patch management automation: Is it worth the hype?

Patch management is a term that’s familiar to all within the depths and boundaries of endpoint security. While the addition of “automation” to this term...

Patch Manager Plus 5 min read Read

Five worthy reads: Digital immune systems—your first line of defense against cyberattacks

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we are exploring the...

ManageEngine 3 min read Read

5 security and administrative challenges for hybrid IT organizations

Ever since the adage “identities are the new perimeter” came into being, companies have started to expand their capabilities and operations beyond on-premises, office-based infrastructure....

AD360 2 min read Read