Search results for: GDPR

Five worthy reads: Is your enterprise dealing with data sprawl properly?

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we define what data...

General 3 min read Read

Five reasons to choose Log360, part 4: Advanced security features

Part two and part three of this blog series gave a detailed look at Log360’s in-depth auditing capabilities, while part one explained how easy the...

Log360 3 min read Read

Prevent downtime in your organization with Mobile Device Manager Plus

It goes without saying that downtime is bad for organizations—not only does it put business-critical data at risk and hamper employee productivity, but it also...

Mobile Device Manager Plus 1 min read Read

[Infographic]Three tips to simplify Active Directory compliance and auditing

In the previous blog of this series, “[Infographic] Still manually onboarding users into Active Directory? There’s a better way!“, we discussed the tips and tricks to...

ADAudit Plus 2 min read Read

[Infographic] Top three password-related issues that plague IT admins

Managing user identities is an everyday affair for an IT administrator. However, in large organizations with complex IT hierarchies, things spiral out of control very quickly. Below...

ADSelfService Plus 2 min read Read

Five worthy reads: Smart Spaces—for smart work or smart theft?

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we’ll talk about Smart...

General 3 min read Read

TI en 2018: Una retrospectiva de ManageEngine

El 2018 está llegando a su fin y es posible que ya esté recordando cómo ha sido este año para usted. En el mundo de...

Español 3 min read Read

IT in 2018: A ManageEngine retrospective

2018 is coming to an end and you might already be looking back at how this year has been for you. In the IT world, 2018 started with the...

ManageEngine 3 min read Read

ADSolutions’ year in review, Part 5: EventLog Analyzer

Our product development team has been focusing on correlation and threat intelligence features, with the goal of thwarting external breach attempts. This year, we built new capabilities,...

General 1 min read Read