The cybersecurity market is ever-changing and primarily driven by sophisticated cyberattacks, disruptive technological growth, and stringent data protection regulations like the GDPR and CCPA. We are constantly evolving our solutions to meet these dynamic market needs. We believe our recognition in the Gartner Magic Quadrant for security information and event management (SIEM) for the fourth […]
Five worthy reads: XAI, a move from black to white
Five worthy reads reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we explore the concept of XAI, Explainable AI. Have you ever wondered about the intricate logic behind sponsored content and recommendation systems found across social media and online retailer pages? With the significant […]
Key security functions of unified endpoint management
As part of digital transformation, the adoption of a wide range of devices for work is on the rise. A unified endpoint management (UEM) solution is capable of enforcing management policies and configurations, as well as securing endpoints. In a previous blog, we reviewed the capabilities of a good UEM solution. In this instalment, we […]
Five worthy reads: Why AI-as-a-Service, or AIaaS, is quickly growing in popularity
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. Most companies use some type of “as-a-service” solution to optimize output, and this week, we shed some light on the latest “as-a-service” trend to hit the market, AI-as-a-Service. Illustration by Amirthalingam S Globally, corporations and businesses […]
Is your business PCI DSS compliant?
How Chooseus Life Insurance lost its customers’ cardholder details and their trust In August 2019, reporters began flocking to Chooseus Life Insurance’s head office in Detroit after news leaked that thousands of the company’s customers had lost money due to a security breach. The CEO of this life insurance company released the following statement: “We […]
Microsoft pulls back faulty updates from February’s Patch Tuesday
Were you among those sysadmins who devotedly installed all the updates from this Patch Tuesday? Well, buckle up! You may have to undo a few. February 11, 2020 was one of the biggest Patch Tuesday update rollouts, with fixes for 99 vulnerabilities. This means a month of patching and related activities for system and IT […]
Microsoft’s February Patch Tuesday comes with fixes for 99 vulnerabilities
This Patch Tuesday, a total of 99 vulnerabilities have been addressed, making the February 2020 Patch Tuesday the biggest yet. As an early Valentine’s gift, Microsoft has provisioned administrators with numerous security and non-security updates to apply to their endpoints. Here’s a quick overview of Patch Tuesday, followed by a detailed account of the numerous […]
IT security: Disrupting the cybersecurity kill chain by detecting domain reconnaissance
Cyberattacks are a growing threat, and organizations are investing time and money in security strategies to make certain that their infrastructures are secure. Active Directory (AD) is a constant target for compromise, as it’s at the core of any organization’s security — it handles authentication and authorization for all users in an organization. Hardening the […]
Meet a Major Player in the UEM and EMM industries
We are delighted to share that market research and advisory firm, IDC, has recognized Zoho/ManageEngine in the following three IDC MarketScape reports: Worldwide Unified Endpoint Management Software 2019–2020 Vendor Assessment (Doc #US45355119, November 2019), Worldwide Enterprise Mobility Management Software 2019-2020 Vendor Assessment (Doc #US45353719, November 2019), and Worldwide Enterprise Mobility Management Software for Ruggedized/ IoT […]
Five worthy reads: Mastering cybersecurity with AI and machine learning
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we discuss the escalating significance of AI and machine learning in IT security space. One of an IT team’s biggest challenges is making sense of the mammoth amount of data that corporate infrastructures produce […]