IT Security | August 1, 2017The GDPR: Requirements pertaining to data collectionWelcome to part two in a four part blog series about the European Union's GDPR. In our previous blog, we discussed highlights and FAQ on the GDPR....
RecoveryManager Plus | July 31, 20175 things to keep in mind before backing up your VMware virtual machinesThe architecture of a virtual machine differs vastly from traditional on-premises environments, and requires...
RecoveryManager Plus | July 26, 2017Best practices for Active Directory backup and recoveryIt's easy to make Active Directory (AD) administrators uncomfortable. Just ask them about their disaster...
ServiceDesk Plus | July 25, 2017Live Chat leads new feature lineup in ServiceDesk Plus updateWe're excited to present ServiceDesk Plus 9315, the latest version of our flagship IT service desk solution....
Endpoint Central | July 21, 2017Forget prolonged text chats. Improve SLA resolution times with enhanced troubleshooting tools Digital communication has seen some major developments in the last few years. Moving from...
General | July 20, 2017Head on down 7th Avenue for ManageEngine's New York User Conference"I'm gonna make a brand new start of it, in old New York." -Frank Sinatra, "New York, New...
Identity and access management | July 19, 2017Approval workflow: Supervise self-service in Active DirectoryAre you comfortable giving end users the power to update their own information in Active...
Log360 | July 18, 2017The case for incident management in a SIEM systemLog360's latest incident management system is the perfect bridge between your incident...
Endpoint Central | July 17, 2017XData and SambaCry add to the whopping number of data breaches this yearWeeks after WannaCry appeared center stage, networks around the world are still being...
Endpoint Central | July 14, 2017Fireball—the zombie apocalypse for internet browsersIf a zombie apocalypse looks like hordes of the undead eating human flesh, a browser...