Network Configuration Manager | September 19, 2022Configuration change management process best practices Nowadays, with growing infrastructure and increased complexity, it's near impossible to...
General | September 19, 2022[Indonesia seminar] Why it's crucial to implement AIOps in today's ITOM Due to the growing popularity of digital platforms among a wider range of industries,...
Applications Manager | September 16, 20225 common Java performance problems and how to avoid them using java monitoring tools Java is one of the most widely used programming languages and it's often used by back-end...
Applications Manager | September 14, 2022A day for the heroes behind the screen Do you ever wonder how our lives got so easy? We can communicate virtually. We can have...
Patch Manager Plus | September 14, 2022September 2022 Patch Tuesday comes with fixes for 63 vulnerabilities, including 2 zero days Patch Tuesday is here again, this time with a plethora of updates. September 2022’s Patch...
AD360 | September 12, 2022Authentication: The first step towards Zero Trust Since the onset of the pandemic, Zero Trust has become a common trend. Unlike traditional...
OpManager | September 12, 2022Linux server monitoring: Long story short Servers are almost inseparable from any IT infrastructure. Linux is the most compatible,...
General | September 9, 2022Five worthy reads: Your data costs you more than you know Illustration by Dhanwant Kumar Five worthy reads is a regular column on five noteworthy...
Log360 | September 9, 2022How to automate incident response and increase security maturity [Webinar] Due to the increase in cyberattacks, security analysts are challenged with multiple...
M365 Manager Plus | September 1, 2022Top five security recommendations for Microsoft 365 When the pandemic hit, organizations around the world shifted their infrastructure to...
AD360 | August 30, 2022Cyber insurance: Here's why you need it With the alarming increase in cyberattacks across the globe, it is becoming evident that...
General | August 26, 2022Five worthy reads: Is extended reality a safe space for advancements in digital transformation? Five worthy reads is a regular column on five noteworthy items we’ve discovered while...