Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Sizing up the CCPA: How the USA's new privacy regulation measures up against the GDPR

The California Consumer Protection (CCPA) act took effect on January 1, 2020, and companies across the globe are scrambling to get their act together to avoid non-compliance penalties. Although enforcement of the CCPA doesn’t officially begin until July 2020, the California Attorney General’s office will still be able to penalize violations that occurred between implementation on January 1 and official enforcement in July.

Recovering from OneDrive for Business ransomware attacks

Ransomware has been a growing threat in recent years, and experts now estimate the cost of these attacks at $7.5 billion in the USA alone in 2019. The affected institutions include 966 government agencies, educational establishments, and healthcare providers. Since most ransomware attacks stem from a small mistake made by one end user, either through phishing emails or stolen credentials, the threat is only expected to increase in the years to come.

IT security: Disrupting the cybersecurity kill chain by detecting domain reconnaissance

Cyberattacks are a growing threat, and organizations are investing time and money in security strategies to make certain that their infrastructures are secure. Active Directory (AD) is a constant target for compromise, as it’s at the core of any organization’s security — it handles authentication and authorization for all users in an organization.

Meet a Major Player in the UEM and EMM industries

We are delighted to share that market research and advisory firm, IDC, has recognized Zoho/ManageEngine in the following three IDC MarketScape reports: Zoho/ManageEngine has also been named a Leader in the IDC MarketScape. In these reports, the IDC MarketScape identified 18 providers and evaluated them in the capabilities, strategy, and market presence.

Endpoint security: The key to protecting your enterprise

To operate efficiently, businesses today use numerous devices such as laptops, desktop computers, and mobile devices. Securing all these devices—collectively called endpoints—significantly improves the overall security of your enterprise’s IT network. This blog can help you get started with endpoint security. To begin with, let’s define endpoint security.

9 essential UEM capabilities that empower your IT administration

Unified endpoint management (UEM) is an IT best practice and strategy for securing and controlling desktop computers, laptops, smartphones, and tablets in a connected, secure manner from a single console. It’s increasingly important for enterprises today because of the prevalence of corporate-owned, personally-enabled (COPE) devices, and bring your own devices (BYOD) policies.

Unpatched zero-day vulnerability in Internet Explorer exploited in the wild

Barely a week after Patch Tuesday, internet security company Qihoo 360 has discovered yet another vulnerability in Internet Explorer (IE), this time due to a remote code execution vulnerability in the jscript.dll scripting engine. The vulnerability, identified as CVE-2020-0674, is considered Critical for IE 11, and Moderate for IE 9 and IE 10.

Oracle Cloud Infrastructure monitoring with Applications Manager

Oracle launched its Generation 2 Cloud Infrastructure in 2018. This second-generation cloud platform is designed to help companies run their most challenging workloads securely. Its ability to run Oracle Autonomous Database makes it the first self-driving platform in the industry. It uses the latest artificial intelligence and machine learning technologies to provide a high performing environment that doesn’t compromise on security.

The value UEM delivers in digital upgradation of enterprises' IT administration

2020 has arrived. Most companies are striving to become digitally transformed, business applications are moving to the cloud, and day-to-day IT operations are becoming more mobile-oriented with executives using a diversified range of devices. Employees don’t just use company-provided desktops; they often work on the go with corporate-owned, personally enabled (COPE) laptops, mobile devices, and iPads; bring your own device (BYOD); etc.