Log360 | March 30, 2021Azure security 101: Security essentials, logs, authentication, and more “Where necessity speaks, it demands”. This old saying seems particularly apt right now...
ADAudit Plus | March 24, 2021Windows logon auditing: Everything you need to know in only 10 minutes [Free e-book] User logon activity needs to be audited to meet various security, operational, and...
OpUtils | March 23, 2021Unraveling open port threats and enhancing security with port scanning tools From exposing your network vulnerabilities to becoming a passageway for intruders, open...
General | March 12, 2021Five worthy reads: Understanding quantum computing and its impact on cybersecurity Five worthy reads is a regular column on five noteworthy items we discovered while...
Key Manager Plus | March 11, 2021Integrate certificate life cycle management with enterprise MDM and boost your mobile ecosystem security A huge portion of today's corporate network is made up of mobile endpoints, such as...
Log360 | March 10, 2021Ransomware in 2021: What has changed? Detection and mitigation strategy A ransomware attack is a bug that we can't shake off. Or perhaps, it can even be called a...
Patch Manager Plus | March 10, 2021Microsoft Patch Tuesday March 2021 fixes 82 vulnerabilities, including 2 zero-days With cybersecurity threats on the rise thanks to the pandemic, it's essential to...
Patch Connect Plus | March 9, 2021Simplify the management of third-party updates for Intune with Patch Connect Plus Enterprise IT administrators and technicians worldwide who are looking to take third-party...
OpManager MSP | March 8, 2021Key network monitoring challenges faced by MSPs and how to overcome them Networks are growing more complex by the day and to monitor them effectively,...
Endpoint Central | March 4, 2021Desktop Central featured in 2021 Gartner Peer Insights Customers’ Choice for UEM At ManageEngine, customer satisfaction is not just a promise, but also a driving force...
Vulnerability Manager Plus | March 3, 20215 reasons integrated patch and vulnerability management mitigates risks swiftly and efficiently ESG research on cyber risk management, which involved 340 cybersecurity professionals,...
Log360 | March 3, 2021Security operations center, Part 3: Finding your weakest link Any organization with data assets is a possible target for an attacker. Hackers use...