Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Start managing Active Directory from your help desk with the new AD management plug-in

ServiceDesk Plus users can now use an AD management plug-in to create and manage Active Directory (AD) users from the ServiceDesk Plus console. This plug-in will automatically add all AD user management actions to this help desk tool’s service catalog. Beyond technicians logging into ServiceDesk Plus to execute requests, regular users can access the tool to raise requests for user management actions.

Five worthy reads: Does your security operations center really make you immune to cyberattacks?

Many enterprises are at the brink of digital transformation, which entails adopting new technologies that process a sea of both personal and enterprise-level data. Despite a surging number of innovations to prevent evolving cyber threats from hijacking that data, the sheer number of successful, high-profile data breaches and attacks recently highlight the insufficient security practices of organizations around the globe.

Adopting a SIEM solution, Part 1: Why choose SIEM?

Many enterprises are at the brink of digital transformation, which entails adopting new technologies that process a sea of both personal and enterprise-level data. Despite a surging number of innovations to prevent evolving cyber threats from hijacking that data, the sheer number of successful, high-profile data breaches and attacks recently highlight the insufficient security practices of organizations around the globe.

Is global expansion crippling your hold on network security?

Globalization and foreign investments have completely changed the way enterprises are run today. Enterprises are expanding geographically to diversify their risk portfolio, but this expansion hasn’t been linear. From mergers to buyouts, today’s enterprises have endless possibilities, which translates into inorganic, exponential growth—something that’s become the industry norm.

Five worthy reads: Is IT Ops at the brink of a digital revolution?

A wave of digital transformation is rolling in—a wave of universal connectivity, personalization, and adoption of intelligent technologies that many organizations have never navigated before. Adopting digital technologies often entails restructuring business verticals and scaling up data processing. One such vertical, IT operations (IT Ops), is finding it challenging to manually handle and process huge volumes of complex data.

Five worthy reads: Data security is taking the world by storm

Information. Data. Personal details. Particulars. Intelligence. Call it what you like—the universal truth is that in the present age, personal data has become one of the most valuable possessions. Companies around the world are scrambling to secure the data they have collected, while those with malicious intentions are vying for these coveted bits of information.

Ransomware attacks continue to rise in 2018

It’s official. Ransomware isn’t just one of the most common types of malware, it is the most prevalent malware used in cyberattacks according to the 2018 Verizon Data Breach Investigations Report (DBIR). This report found that of the data breaches involving malware in 2017, 39 percent made use of ransomware, which was twice the amount used the previous year.