Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

StrandHogg vulnerability threatens 500 of the most popular Android apps

Earlier this month, security researchers at Promon, a Norwegian firm that specializes in in-app security, uncovered a unique vulnerability in Android devices that allows malicious apps to masquerade as legitimate apps and prompt for intrusive permissions that allow them to: Listen to the user through the microphone, Take photos using the camera, and a lot more.

ServiceDesk Plus named Contender in the Enterprise Service Management space by independent research firm

Forrester has recognized ManageEngine as a contender in the Enterprise Service Management (ESM) space in its latest Forrester Wave: Enterprise Service Management, Q4 2019 report. The report covered twenty-three criteria and recognized fifteen providers in the ESM space.

ManageEngine recognized as November 2019 Gartner Peer Insights Customers' Choice for IT service management tools

ServiceDesk Plus, ManageEngine’s flagship ITSM software, has helped over 100,000 service desks around the globe streamline and efficiently manage their IT service management processes. Now, we’re excited to announce that we’ve been recognized as a Gartner Peer Insights Customers’ Choice for IT service management tools! This is a testament to the extensive ITSM capabilities of ServiceDesk Plus.

What is vulnerability management and why should enterprises adopt it?

In the current digital era, enterprises across the world heavily rely on information systems for day-to-day operations and for accessing business-related data. In essential institutions, such as banking and financial, health, and government, protecting information is critical and any security mishap could disrupt daily operations. The intention of attackers is to either deny services until a ransom is paid or breach security to gain access to critical information.

Five worthy reads: The privacy implications of AI

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we explore the relationship between AI and data privacy. From smart devices and voice assistants to mediating traffic and enhancing personalized shopping experiences, artificial intelligence (AI) has found widespread application in many aspects of life.

Why businesses need to suit up against cyberattacks in 2020

Cyberattacks are never going away; in fact, things appear to be getting worse. The complexity of attacks has escalated, resulting in more sophisticated, targeted takedowns. Just look at the attacks in Baltimore, Atlanta, Florida, and Spain within the past few years. Organizations around the world have had their operations halted by ransomware, with some taking weeks to get back to normal.

G2 recognizes ManageEngine as a High Performer and the Momentum Leader in UEM

Managing devices and offering the security customers expect is what makes ManageEngine stand apart in the unified endpoint management (UEM) category. Our UEM offering, Desktop Central, delivers a wide range of features addressing all endpoint-based challenges. Desktop Central is under continuous development and offers support to evolving operating systems, hardware, applications, and technology.

Apple in 2018, now Tesla-who's next in the line of internal data leaks?

Recent allegations of an ex-Tesla employee syncing the Autopilot source code to his personal iCloud account is yet another classic case of how poor data security is, even in some of the most technologically advanced organizations. The Tesla leak isn’t even the first time that a data breach of such immense magnitude pertaining to self-driving technologies has occurred; in July 2018, an Apple employee was caught using AirDrop to transfer 40GB of confidential data to a personal PC.

Here's how Rojan, a leading MSP in Australia saves thousands on IT maintenance costs with OpManager

Rojan Australia Pty Ltd is a managed IT services provider that supports a wide assortment of customers and businesses, and provides services such as hosted Microsoft Exchange, Xen Citrix servers, rack space, internet links, and desktop support.