By Karthika Surendran This month’s Patch Tuesday is here and the hustle is on. With most organizations embracing a distributed workforce these days, system administrators are bound to be up to their ears in work for the next two weeks, testing and figuring out how to deploy updates to secure all of their machines. It […]
Five worthy reads: Is DataOps the next big value driver in the analytics ecosystem?
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. In this edition, we’ll learn about DataOps, an interesting methodology that can help organizations fast-track their data analytics operations. By Monisha Ravi With the current data trend, there is an ever-increasing demand for data professionals to […]
Launching RMM Central: A unified IT solution for managed service providers
By Nisha Balajee We’re pleased to introduce ManageEngine RMM Central, a unified remote monitoring and management solution. Maintaining the IT infrastructure and systems of client networks is a herculean task for IT service providers. Multiple tools perform various capabilities in network management, be it maintaining or managing workstations, laptops, servers, and other networks. Managed service […]
DHCP server monitoring made easy with OpUtils
By Sharon Abraham In today’s complex IT infrastructures, Dynamic Host Configuration Protocol (DHCP) servers play an indispensable role in automating IP allocation and configuration. A DHCP server’s capacity to allocate IPs to the requesting clients in real-time is one of the factors that ensures constant uptime of dynamic networks. However, even though a network’s availability […]
Operation panopticon: How a weak IAM strategy led to the security camera hack across organizations
By Abhilash On March 9, 2021, Verkada, a software company that specializes in making security cameras for monitoring physical access control, was subject to a security hack. Hackers gained access to the video feed of at least 15 thousand cameras deployed across various locations and exposed the inner workings of hospitals, clinics, and mental health […]
Five worthy reads: Location intelligence—the key to next-level data utilization
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week we explore the rising scope of location intelligence in improving the overall customer experience. By Abirami A The pandemic has pushed businesses out of their comfort zones and boosted digitization. Organizations have started to […]
Five worthy reads: The unexpected costs following a cyberattack
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. In this edition, we’ll learn about the worst data breaches that happened recently, their impact, and the cost of data breaches for companies. The COVID-19 pandemic has not only had an impact on the mental and […]
Is the cloud coming to all of us?
By Muhammad Firdaus During the past twenty years, so much has changed in the IT office. Two decades ago, we were still using dial-up modems. Now, the entire world wide web is at our fingertips, and our world of IT is more efficient but complicated too. A few significant IT trends have also developed during […]
Microsoft Patch Tuesday April 2021 fixes 108 vulnerabilities, including 5 zero-days
By Gokila Kumar Yet another month, yet another Patch Tuesday. With the never-ending cybersecurity threats brought on by the pandemic, it’s essential to understand the importance of Patch Tuesday releases and find ways to efficiently deploy the new updates to remote endpoints. This Patch Tuesday, Microsoft has released fixes for 108 vulnerabilities, among which 19 […]
Microsoft Patch Tuesday March 2021 fixes 82 vulnerabilities, including 2 zero-days
With cybersecurity threats on the rise thanks to the pandemic, it’s essential to understand the importance of Patch Tuesday releases, and find ways to deploy them to remote endpoints efficiently. This Patch Tuesday, Microsoft has released fixes for 82 vulnerabilities, among which 10 are classified as Critical, and 72 as Important. Along with these vulnerabilities, […]