Latest Posts

What do the phrases qwerty, password, and 123456 have in common?

Theyre all weak passwords! Not only are these passwords predictable, they also top the list of the 25 most widely used passwords of 2016

So despite security experts’ constant efforts to alert users about cyber security and

Active Directory Free tools 2 min read

Six best practices for virtual machine backup and restoration

The architecture of a virtual machine is vastly different from traditional on-premises environments and requires different data backup techniques. This post will explain some of the best practices for backing up virtual machines.


1. Take incremental backups to improve backup

RecoveryManager Plus 2 min read

[Free webinar]  ITSM metrics vs ITSM analytics: What it takes to connect the dots in your IT support 

Lost business hours, change success rate, first call resolution rate, and SLA compliance rate are some of the key metrics that help improve the quality of service delivery. Metrics like these help find answers to the question: “What’s wrong

ServiceDesk Plus 1 min read

Survey reveals 82 percent of ITSM professionals believe IT jobs will get harder

As an ITSM professional focused on consistently providing quality service, its easy for certain things to slip your mind. For example, have you ever thought that recent newsworthy events could even remotely affect your job? Headlines like

Help Desk 1 min read

Office 365 help desk delegation with O365 Manager Plus

While Office 365 lets you work from anywhere around the globe, the management features it provides are often insufficient. When an organization is spread across multiple countries, it’s difficult for one administrator to single-handedly manage every user and mailbox.


O365 Manager Plus 2 min read

Security breach! Get the AD protection you needed…yesterday

Security. This word has become more important now than ever, especially with recent news of ransomware attacks such as WannaCry. And while you’re thinking about security, don’t forget about identity access management (IAM). Without an effective IAM plan, your company

ManageEngine 2 min read

ManageEngine ranked second in Capterra’s list of top 20 ITAM software

Capterra, a leading web-based service that helps users find the best software in the market, frequently publishes reports on the top software in a particular field. We’re happy to announce that we were just ranked number two in Capterra’s list

ManageEngine 2 min read

5 crucial facts that you must know about identity and access management

IAM is IT-centric.

Identity and access management (IAM) may appear easy to some, but in reality, it is very tricky. Proper IAM is the key to a healthy environment because it provides the ability to create, manage, and delete objects. …

AD360 4 min read

Six reasons why snapshots can’t replace virtual machine backups

What is a snapshot?

A snapshot captures the active configuration, memory, and storage system of a virtual machine. Any change made to VMs after a snapshot is created is written on the snapshot while the actual VM hard disk

RecoveryManager Plus 3 min read

Single sign-on (SSO) for the cloud

Nearly every organization has some cloud-based application. Of course the common cloud apps include Microsoft Azure, Office 365, G Suite, those from Zoho and Salesforce, and more. As administrators, we want to make our jobs more efficient and we also …

ADSelfService Plus 1 min read