Search results for: 7 problem management

Minimizing membership in the local Administrators group on workstations

If you have a long list of users with administrative rights, there’s a good chance you’ve offered excessive amount of privilege to accounts that don’t...

Active Directory 3 min read Read

Applications Manager: A game changer for multiple businesses

To retain a competitive advantage in today’s fast-paced digital market, organizations need to focus on their application stack. Error-prone or bug-ridden applications may deter potential customers from visiting a site...

Applications Manager 2 min read Read

Advanced analytics for ServiceDesk Plus’ ticket history, projects, and knowledge base modules

We’re happy to announce the release of advanced analytics for three more ServiceDesk Plus modules: Request transition history—Visualize the complete request timeline, from ticket creation to ticket...

Analytics Plus 3 min read Read

Conquer it with correlation—Part 2: The data breach

In my previous post, we looked at how event correlation can be used to deal with advanced persistent threats (APTs). The thing is, an APT...

Log360 4 min read Read

Industry best practices for endpoint security

Lately, hackers on the lookout for vulnerable systems have kept the IT industry busy. While various OS and software vendors strive to keep their users’ data intact by...

IT Security 4 min read Read

Webinar: Learn a simple three-step approach to tackling threats

Technology has a lot to offer, from streamlining your business processes to protecting your network, but with all the advantages comes the risk of cyberthreats. Cybercriminals are always developing new...

Log360 1 min read Read

Prevent Man-in-the-Disk attacks using the right mobile security procedures

Organizations that offer employees the freedom of mobility gain some advantages, which can include better productivity or saving workplace costs by allowing employees to work from home, but doing so comes...

Mobile Device Manager Plus 2 min read Read

ITOM seminar in Australia: Attend. Learn. Leverage.

The biggest challenge enterprises face today is embracing new technologies and using them to effectively meet their business requirements. In the past, technology only existed on-premises for enterprises, but now, almost 93...

Network 1 min read Read

Linux security and patching: Are you as safe as you think you are?

  A common question posed by enterprises when it comes to defending against cyberthreats is “Which operating system is most secure?” There are only a few...

Endpoint Central 2 min read Read