Category: ManageEngine

A kernel of truth: Linux isn’t as foolproof as we may have thought

By Joyal Bennison A world without Linux is hard to imagine. Every Google search we run is accomplished on Linux-based servers. Behind the Kindle we enjoy reading, to the social media sites we spend scrolling away every day sits the Linux kernel. Would you believe your ears if I tell you the world’s top 500 […]

Five worthy reads: Differential privacy—what it means for businesses

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. In this edition, we explore one of the evolving privacy-enhancing techniques called differential privacy and how it’s being leveraged by organizations to safeguard sensitive data from being exposed. By Abirami A Cutting-edge technologies based on artificial […]

Securing endpoints, part 1: Ensuring hackers don’t manipulate your browsers to carry out attacks

By Bhuvaneswari Kg In a world of automation, computers and the data on them have become the backbone of many organizations. But data is a double-edged sword. It can be leveraged by organizations to improve operations, but in the wrong hands, it can be a deadly weapon for hackers. So how do organizations ensure their […]

44 vulnerabilities, including 3 zero-days, fixed in August 2021 Patch Tuesday

By Karthika Surendran After last month’s PrintNightmare vulnerability, system admins are only just catching their breaths, but this month’s Patch Tuesday is already here, so it’s back to hustling for IT teams. With most organizations embracing a distributed workforce, system administrators are bound to be up to their ears in work for the next two […]

Why implementing Zero Trust is more important than ever before

By Sree Ram Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we explore why organizations should implement Zero Trust in 2021. In 2010, John Kindervag introduced the concept of “Zero Trust” which has become a touchstone for cyber resilience and persistent security. […]

3 reasons to use network diagram software

By Gagana G. Due to the evolution of IT systems, the recent shift to a hybrid workforce, changing client requirements, and other reasons, network monitoring has become much more complex. IT admins need to visualize the entire network infrastructure effortlessly. Gaining visibility into the network makes it easy to spot patterns, proactively troubleshoot faults, ensure […]

Remote work and its lasting impact: What our global research uncovered

By Priyanka Roy The COVID-19 pandemic has not only had a profound impact on everyone across the globe; it has also fundamentally changed the way organizations function. We are nearing one and a half years since remote work became the norm and organizations had to adapt to this new mode of working almost overnight. This […]

Boosting performance with network monitoring solutions

By Sharon Abraham Technological advances and emerging networking concepts are constantly shaping our IT infrastructure. Networks are no longer limited to traditional networking constraints such as its static nature, but are continually evolving to improve efficiency by spanning across wired, wireless, virtual, and hybrid IT environments. This IT evolution drives organizations to advance digitally and […]

Five worthy reads: Distributed cloud is the future of cloud computing

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. Distributed cloud allows organizations to bring cloud computing closer to their location. This week we look at why it’s the future of cloud computing. By David Simon Distributed cloud computing enables organizations to distribute cloud services […]

10 essential cybersecurity tips for beginners

By Raghav Iyer Organizations today are challenged by an increased exposure to cyber threats. Attackers often target emerging technologies since the new technology is often ill-equipped to handle an attack. Moreover, the internet has become filled with malicious links, Trojans, and viruses. The pressure to keep up with the new and emerging technologies often coerces […]