Endpoint Central | August 18, 2020South Africa's GDPR: The POPI Act and its impact on Desktop Central users The Protection of Personal Information (POPI) Act puts South Africa's data regulation...
General | July 24, 2020Five worthy reads: Remote workplaces: Is hybrid the way to go? Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
ADManager Plus | June 22, 2020Smart Active Directory management from a smartphone With IT admins working from home, like everyone else, routine challenges have increased,...
IT Security | May 11, 2020SQL Server, Part 3: Adopting the principle of least privilege In the previous blog in this series, we discussed authentication and authorization...
General | April 21, 2020SQL Server, Part 2: Authentication and authorization mechanisms in SQL Server, simplified In the previous blog of this series, we discussed how monitoring SQL Server activities...
ManageEngine | March 27, 2020Remote work: Being productive in a pandemic With coronavirus (COVID-19) wreaking havoc across the globe, its disastrous effects are...
General | March 19, 2020The truth about server virtualization management: Tried and true techniques Server virtualization management is a strategy of running multiple autonomous virtual...
Endpoint Central | December 10, 2019Windows 7 to Windows 10 migrations, Part four: A one-stop migration solution In this blog series, we've looked at the consequences of using Windows 7 at its end-of...
Endpoint Central | December 6, 2019Windows 7 to Windows 10 migrations, Part three: The quick, easy, and advanced methods of deploying the OS In part two of this blog series, we saw in detail how computers will be affected by...
Endpoint Central | December 5, 2019Windows 7 to Windows 10 migrations, Part two: Hardships and complexities in the process In our previous blog, we discussed why you need to upgrade Windows 7 after the end-of-life...
Endpoint Central | December 2, 2019Windows 7 to Windows 10 migrations, Part one: Windows 7 end of life Over 26 percent of the world's computers are at risk of exposing themselves to critical...
Endpoint Central | October 23, 2019Monitor these loopholes to ensure complete network security The continuous evolution and growth of the endpoint devices in enterprises makes network...