May Newsletter 2019

Please add to your address book | View online version

May, 2019

Take charge of your business workflows
and facilitate effortless communication
between your organizational teams


Whether it’s technical support or software development, Orchestly helps you
optimize your business processes. It acts as the command center by bringing all
the information and tools you need to manage workflows onto one platform.

Orchestrate your workflows

ServiceDesk Plus introduces its very
own virtual support agent


Zia, Zoho’s virtual support agent, is now available in the cloud version of
ServiceDesk Plus, giving service desk teams the opportunity to improve their
response rates and productivity, and achieve greater customer satisfaction.

Meet Zia

ManageEngine named an April 2019
Gartner Peer Insights Customers’ Choice


OpManager helps ManageEngine receive recognition as an April 2019 Gartner
Peer Insights Customers’ Choice for IT Infrastructure Monitoring Tools.

What customers are saying

E-book: Six ways analytics can facilitate proactive IT operations management


Proactive IT operations management can help you anticipate problems and
troubleshoot blind spots to better serve end users. In this e-book, you’ll learn
six ways analytics can help you proactively manage IT operations.

Grab your copy now

Five tell-tale signs that you’re heading
for a compliance violation


Want to get a clean bill of health from IT regulatory bodies? Keep an eye out
for these five red flags in your network to avoid compliance mishaps.

Learn how

Applications Manager now supports
Network Policy Server (RADIUS server)


You can now monitor critical metrics for your RADIUS servers, like their
availability, CPU usage, and the number of authentication
requests per second.

Dive into the details

ManageEngine has been named a 2019 Gartner Peer Insights Customers’ Choice
for Unified Endpoint Management (UEM)


Customer satisfaction is at the heart of everything we do. Our users are our
biggest and most vocal advocates, and what they say about Desktop
Central is fantastic!

Why they love us

E-book: Five steps to remediate your compromised Office 365 account


Minimize the damage from account compromise in your Office 365 setup by
learning how to quickly identify the security risks and fix the
compromised account.

Manage the damage

Mitigate malicious logins, privilege abuse,
data breaches, and more


Leverage machine learning and statistical analytics to analyze user behavior
and secure your Windows Server infrastructure.

Get started now

Meet your new IT assistant, Zia


Manage endpoints hands-free while you’re on your way to work, getting ready
to hit the hay, out running an errand, or even when you’re just
being a couch potato.

Learn how!

Monitor the performance of single-page applications (SPAs)


Monitor SPAs built in AngularJS, Ember.js, React, Backbone.js, and other
frameworks using Site24x7 real user monitoring (RUM). Track route changes
and AJAX calls, and optimize the end-user experience.

Start monitoring

The key to seamless database performance monitoring May 22, 2019 Register »
SIEM best practices and use cases May 22, 2019 Register »
Busting the analytics myth: Can analytics really help you improve help desk processes? May 23, 2019 Register »
Learn how to manage network configurations and prevent network disasters May 28, 2019 Register »
Five everyday challenges in identity management and how to sail through them May 28, 2019 Register »
Active Directory password self-service for Windows, macOS, and Linux systems May 29, 2019 Register »
This month’s top blog posts

Rule impact analysis: A new dawn of firewall policy planning
Five worthy reads: Wrapping security into every aspect of DevOps
Brick and mortar meets mobile: Combining the best of both worlds
Sign up for our blog digest

April Newsletter 2019

Please add to your address book | View online version

April, 2019

ManageEngine recognized in Gartner’s
MQ for NPMD two years in a row


Gartner has taken note of OpManager’s newly added
features driven by customer feedback.

Inside the MQ

We’re a 2019 Gartner Peer Insights
Customers’ Choice for Privileged
Access Management


Our customers have spoken. Password Manager Pro is now one of the
top choices of IT security professionals for protecting their privileged
accounts and controlling administrative access.

The inside scoop

Another MQ appearance for ManageEngine: APM


We’re honored to be featured yet again in Gartner’s Magic Quadrant for Application Performance Monitoring.

Dive into the details

Take a crack at our password guessing game


You may be surprised by how easy it is to guess common passwords.

Start guessing!

Observe, monitor, and optimize AWS costs


Gain better visibility into how much your business is spending on AWS, see
running costs for the past six months, evaluate monthly spending, identify
the three most costly services, and more.

Control your costs

Busted: Three identity management myths


Meet IT administrators Mark and Sarah. While Mark believes that conventional
user account management practices still hold up, Sarah begs to differ.
What do you think?

Move past the myths

ML-powered analytics to identify user and entity behavior anomalies


Log360 adds new capabilities including score-based risk assessment, threat
corroboration, and anomaly detection.

See UEBA in action

[Free e-book] Detecting Office 365 service health


Frustrated with Office 365 service outages? Learn how to receive instant
notifications to ensure faster downtime resolution.

Fix outages now

[Free guide] Twelve best practices for
effective patch management


Patching is a fundamental part of endpoint management. Ensure it’s
done the right way!

Patch the best way

Key Manager Plus scales up PKI automation


Leverage our integration with The SSL StoreTM to request, acquire, renew, and track certificates from multiple public CAs from a single pane of glass.

The best of both worlds

Dallas UserConf: Three days, additional
tracks, and more fun


Don’t miss your chance to catch live demos, one-on-one sessions with
experts, networking opportunities, and more.

Grab your seats
Learn the gray areas of privacy compliance from the viral Monopoly Man April 16, 2019 Register »
Protect your network from threats: Optimize firewall performance April 23, 2019 Register »
How to shield telecommuters from password troubles and ensure business continuity April 24, 2019 Register »
How analytics for change management processes can save you millions April 25, 2019 Register »
Top 5 IT security red flags that indicate you’re vulnerable to insider threats May 2, 2019 Register »
How to detect insider threats and account compromise in Office 365 April 25, 2019 Register »
Accelerating threat detection and response with UEBA May 2, 2019 Register »
This month’s top blog posts

The what, why, and how of unified endpoint management
New integration offers a consolidated look at your APM alerts
Here comes the California Consumer Privacy Act, an echo of the GDPR
Sign up for our blog digest

March Newsletter 2019

Please add to your address book | View online version

March, 2019

Dallas UserConf ’19: Learn from the people behind the tools you love


Three days of hands-on training, one-on-one sessions,
and immense fun.

Claim your early-bird pricing

Amp up your cybersecurity game with ManageEngine’s all-new Vulnerability Manager Plus


Vulnerability Manager Plus is an enterprise solution that hunts down vulnerabilities, misconfigurations, and security loopholes in your network, while keeping your systems and servers secure.

Try it for free

New cloud identity solution for enterprises


All-new Identity Manager Plus offers cloud-based single sign-on for Office 365, G Suite, Salesforce, and other enterprise applications.

Get exclusive access

ServiceDesk Plus Cloud introduces a CMDB
in its enterprise edition


ServiceDesk Plus Cloud now provides a CMDB. Service desks can define CIs, track their relationships, and gain greater control.

Click to explore

E-book | Choosing the right chart for your IT data


With so many chart types available, choosing the right charts to study your IT data can be confusing. In this e-book, we’ve picked nine charts and outlined how you can use them effectively to get insight into your IT data.

Download e-book now

10 crucial security audit reports every admin needs


Read our e-book to access audit reports and track crucial security events, such as user logons and data accesses.

Events you need to track

Detect security threats by tracking Active Directory user login history


Get a consolidated login trail of users and leverage machine learning to analyze login patterns.

Show me how

How do I achieve and sustain enterprise IT security?


That’s the question most IT admins have asked themselves at some point. Our free e-book has the answer.

Safety first!

E-book | The Basics of Network Monitoring


Revisit the fundamentals of network monitoring and best practices to improve your network’s performance.

Get your free copy

Who knew Identity Management could
be so much fun?


Don’t believe us? See for yourself how managing user identities can be like playing a game. You can tackle onboarding, managing, off boarding, and a whole lot more across AD, Office 365, G Suite, etc.

Play the game
Secure Windows logons with two-factor authentication (TFA) March 27, 2019 Register »
Safeguard your network from intruders — OpUtils free training March 27, 2019 Register »
Free OpManager online training April 3, 2019 Register »
Building the threat intelligence capabilities of your organization April 9, 2019 Register »
This month’s top blog posts
Microsoft Patch Tuesday updates for February 2019
Five Worthy Reads: AI and ML:
Keys to the next layer of endpoint protection
Five Worthy Reads: The business benefits of serverless computing
Five Worthy Reads: Augmented analytics paves the way
Application Manager recognized as
2019 Gartner Peer Insights Customers’ Choice
Sign up for our blog digest

February newsletter 2019

Please add to your address book | View online version

February, 2019

E-book: Seven reasons your help desk needs analytics


Create custom metrics. Perform investigative analysis. The reasons don’t stop there.

Dig deep

Gain visibility on every layer of your app stack with 50+ plug-ins


Keep tabs on the subsystems in your application platform to optimize your server monitoring experience. Gather custom metrics from MySQL, Apache, NGINX, and Nagios, or build your own plug-in.

Unveil hidden layers

Top IT security risks that you need to address ASAP


Unmanaged privileged accounts can amplify security threats and leave your organization vulnerable to privilege abuse attacks. Use Password Manager Pro to mitigate password-related security risks.

Monitor privileged accounts

What makes Patch Manager Plus a secure solution for enterprise patching?


Learn what goes into the security hardening of our patch management software.

Patch the secure way

Best ways to map the business impact of application performance issues


This e-book will walk you through the challenges you might face during application monitoring, their impact on your business, and how you can overcome them effectively.

Show me how

E-book: Top 10 tips to protect your company’s data from malicious insiders


Learn how to prevent security breaches perpetrated by ignorant, negligent, or malicious employees.

Look within

AD password caches troubling your telecommuters?


Never let forgotten passwords get in the way of your telecommuters’ work. Empower them to reset their passwords by themselves, even when on the move.

Watch and learn

Find and investigate malicious emails in Office 365


Go beyond keyword-based content searches. Ensure complete protection of personally identifiable information and confidential business data with pattern-based searches, custom search schedules, and more.

Start searching
Making IT more efficient with password sync and single sign-on February 20, 2019 Register »
How to manage IT projects like a pro using analytics February 21, 2019 Register »
Stay ahead with SIEM: Beat rampant threats in 2019 February 26, 2019 Register »
Break free of application performance barriers February 27, 2019 Register »
Securing critical business data with a comprehensive Office 365 mailbox content search February 28, 2019 Register »
The changing role of ITSM in 2019 March 5, 2019 Register »
Monitoring Active Directory: How thinking from an attacker’s perspective helps March 7, 2019 Register »
This month’s top blog posts

A year of Meltdown and Spectre: Questions that still remain
ManageEngine recognized in Gartner Magic Quadrant for
Security Information and Event Management three years in a row
Five worthy reads: The role of workforce preparedness in digital transformation
KPIs to monitor for optimal SQL Server performance
Six reasons why data backups are crucial for your business
Sign up for our blog digest

January Newsletter 2019

Please add to your address book | View online version

january, 2019

ServiceDesk Plus introduces its long-awaited
Request Life Cycle feature


Service desk technicians can design the complete life cycle of requests, including statuses and transitional actions, using a drag-and-drop canvas.

Ready for RLC

Site24x7 introduces cloud-based performance monitoring for Node.js applications


Monitor and optimize the performance of all events and I/O operations in your Node.js applications for a better user experience.

A nod to Node.js

ManageEngine positioned in Gartner’s first-ever Magic Quadrant for PAM


Read the report to learn why ManageEngine was recognized and gain insight into the latest privileged access management trends.

Picks for PAM

Free e-book: 11 best practices to save your business from network pitfalls


These tried and tested network administration practices will help keep downtime at bay.

Done with downtime

Cybersecurity quiz: Your chance to win a $100 Amazon gift card


Remember when Meltdown and Spectre shook the IT industry in 2018? Here’s a quiz to test your cyber awareness, especially your knowledge of these processor flaws.

Quiz me

Infographic: 10 best practices to enrich your cybersecurity in 2019


AI, blockchain, and IoT will challenge IT departments in 2019. Here are some best practices to fortify your defenses.

Prepare for 2019

ManageEngine Log360 placed in Gartner MQ for SIEM, 2018


For the third year in a row, ManageEngine has been recognized in Gartner’s Magic Quadrant for Security Information and Event Management.

Read the report

Active Directory security: Multiple threats, one solution


Secure your AD infrastructure with ADAudit Plus’ real-time change auditing and user behavior analytics (UBA) capabilities.

Click to explore

Free e-book: Five steps to increase your Office 365 Secure Score in 24 hours


Hackers are ready with their next big plan for 2019. Protect your Office 365 setup by implementing these security best practices.

Raise your score

Five signs you need to automate your IAM process


If you spot any of these symptoms that indicate gaps in your IAM strategy, then it’s time to make your IAM operations hands-free.

Make things easier
Gain insights on real-time performance monitoring for an efficient network January 16, 2019 Register »
How to defend your Office 365 setup with a higher Secure Score January 23, 2019 Register »
Protect your network from threats: Optimize firewall performance January 29, 2019 Register »
This month’s top blog posts
IT in 2018: A ManageEngine retrospective
Preventing the SQLite Magellan vulnerability
from damaging your applications
AWS monitoring 101: Metrics to watch out for
Secure your browser against these 5 threats
Sign up for our blog digest

December Newsletter 2018

Please add to your address book | View online version

December, 2018

Happy holidays! Spread some joy.

Remembering 2018, a year of change


As we approach 2019, we look back and size up what ManageEngine has achieved over the past year.

Go back in time

Kick-start a proactive cybersecurity strategy for 2019


Ransomware attacks will cause an estimated $11.5 billion in damages across the globe in 2019. Fortify your business’ security before it’s too late.

Prep for 2019

10 firewall best practices for security admins


Firewall rules, if left unmanaged, can leave your network open to attacks. Learn how to configure your firewall for maximum effectiveness.

Fuel your firewall

A must-have guide on secure password sharing practices for enterprises


Gain insight into detrimental password sharing practices that can put your organization at risk, and learn how to handle them with expert tips on better password security.

Wise up

Aurora monitoring redefined


Embrace the security, reliability, availability, and simplicity of open-source databases with support for Amazon Aurora in Applications Manager.

Amazing Aurora

Keep a close eye on changes made to your business-critical files


With DataSecurity Plus’ file change monitoring tool, you can easily track and analyze every activity happening in your file servers.

Simplify server security

Free resource kit: One solution for Office 365 migration, security, and management


Get all the resources you need for free Office 365 migration to improve security and compliance, and simplify Exchange Online and Azure AD management.

Here’s all you need

Safeguard files and folders in your Linux devices with Log360


Track the creation, modification, deletion, and renaming of files and folders in Linux devices, along with permission changes, using predefined reports and alerts.

Tell me more

Smart, data-driven Active Directory management with custom dashboards


Focus on the critical aspects of AD and track the status of AD tickets from ADManager Plus’ revamped dashboard with an intuitive, flat UI.

Try it now
The role of SIEM in PCI DSS compliance January 22, 2019 Register »
This month’s top blog posts
Microsoft Patch Tuesday update November 2018
Deploying OSs to remote offices just got easier
OpManager doubles the number of device templates,
cuts your work in half
Secure your browser against these 5 threats
Sign up for our blog digest

November Newsletter 2018

Please add to your address book | View online version

November, 2018

E-book: 5 ways to ensure business
continuity in the wake of network disasters


When disaster strikes, restore your network to the best working version by adopting our simple solutions.

Get disaster-ready

Multiple security problems,
one solution: Event correlation


From data breaches to advanced persistent threats, Log360’s correlation module can protect you from today’s most pressing security problems.

Get my resource kit

AI-driven Azure monitoring and our
Microsoft Teams chatbot integration


Manage over 100 Azure products and gain visibility into hybrid cloud environments.
DevOps teams can use ChatOps in Microsoft Teams to simplify
IT monitoring as well as incident management tasks.

Start monitoring

Microsoft announces end-of-life for
Windows 7


Learn how to update all your organization’s computers to
Windows 10 before January 2020.

The clock is ticking

Advanced analytics for ServiceDesk Plus’
ticket history, projects, and knowledge base management modules


Understand the ticket journey, promote self-service, and manage IT projects more efficiently using Analytics Plus.

Try it now

Video guide: The top three ways to help
AD admins succeed


Frustrated by the lack of provisioning for Active Directory bulk management? Watch our guide to see how you can solve your biggest Active Directory identity management challenges.

Become a super admin

How one retail solutions giant secured
over 10,000 mobile devices


Smollan protects its data, improves productivity, and cuts costs
with Mobile Device Manager Plus.

Read more

Are leaky Office 365 productivity apps
putting your data at risk?


Learn how to secure your Office 365 apps with comprehensive usage reporting, real-time monitoring, advanced auditing, and alerting.

Plug the leak

The key to resolving IT issues from the
comfort of your desk


With Remote Access Plus moving the cloud, you can now securely access
remote computers without interrupting the workflow of your employees.

Get comfortable

Detect and troubleshoot Active Directory account lockouts with ease


ADAudit Plus notifies IT admins about lockouts in real time; its consolidated audit
trail goes one step further and helps resolve them, too.

Try it for free

An AD password management guide
just for schools


Students and teachers forgetting their passwords doesn’t have to trouble you anymore! Grab our admin’s guide and learn how self-service password reset can help.

End password worries

Securing file servers and mitigating ransomware November 27, 2018 Register »
Configuration backup & disaster recovery November 27, 2018 Register »
Overcome application performance monitoring barriers November 29, 2018 Register »
Monitoring Active Directory and Windows: Indications you are under attack December 4, 2018 Register »
This month’s top blog posts
Top 5 enhancements of the Windows 10 October 2018 update
Everything you need to know about linked mailbox management
Key metrics for Elasticsearch performance monitoring
The Australian way of mitigating cybersecurity incidents
Five worthy reads: The 5G digital metamorphosis
Sign up for our blog digest

October Newsletter – 2018

Please add to your address book |
View online version



October, 2018


Applications Manager is a game changer for leading mobile phone network provider


Learn how Digicel performs health checks 40 percent faster with Applications Manager.

Straight from the horse’s mouth


Changes to change management

in ServiceDesk Plus


Enhanced change, Active Directory, and mobile device management; an improved form customizer; a customizable login page; and more—all in ServiceDesk Plus 9418.

Time for a change


F5 joins list of supported vendors in

Firewall Analyzer


Generate detailed, out-of-the-box security and traffic reports on F5 BIG-IP firewalls using Firewall Analyzer.

Fire up the firewall


Free infographic to enhance your



Is your business equipped with the right security controls to combat evolving cybersecurity threats? Now’s the time to learn how to protect your network.

Grab your infographic


Visualize and automate network discovery

with Layer 2 maps


Get complete visibility into your network to visualize connectivity issues and optimize performance from a single window.

On to new discoveries


Feeling unequipped to manage your SSL environment?


Key Manager Plus now provides out-of-the-box enhancements that help you tighten your grip on SSL certificate management and avoid security threats and outages.

Get a sneak peek


ManageEngine strengthens endpoint security with the launch of Browser Security Plus


Browser Security Plus is a browser management solution that helps organizations secure their corporate data in the cloud and protect their networks from web-based cyberattacks.

Try it for free


SIEM is crucial for complying with PCI DSS


Read our free guide to learn how Log360 can help your organization meet important security requirements of PCI DSS compliance.

Secure cardholder data


The top 5 IT security red flags

to look out for


Pearls of wisdom for AD admins Here’s a handy way to find out if your organization is at risk.

I’m all ears


Detect all unauthorized logon attempts to

your network in real time


Audit logon failures to keep your Windows servers secure and compliant. Get real-time reports and instant email or SMS notifications.

Focus on failures

Securing and protecting networks: Endpoint security October 17, 2018 Register »
7 reports that will change the way you manage your help desk October 18, 2018 Register »
Securing and protecting Active Directory October 22,2018 Register »
Protect your network from threats: Optimize firewall performance October 23, 2018 Register »
This month’s top blog posts
Why mobile device management will enhance enterprise IT security
Tired of switching between multiple solutions to manage

different device types?
OpManager named leader in Software Reviews’ 2018

Network Monitoring Data Quadrant
Five worthy reads:

The human factor in IT teams and organizational success
Sign up for our blog digest

September Newsletter – 2018

Please add to your address book | View online version

September, 2018

Learn from the best at our
Chicago User Conference


Two days of hands-on training—now at half the price.

Claim your early bird pricing

Strengthen your first line of defense
against hackers


Don’t be a victim of common hacks like brute force, social engineering, and dictionary attacks. Learn from our expert’s guide to cybersecurity.

Up your defenses

Privileged access management practices for healthcare cyber hygiene


A PAM routine, when followed religiously, can help healthcare organizations
secure access to patient data as well as prove compliance with HIPAA regulations.

Build up your immunity

Auto-remediate your IT incidents


Learn how to automatically execute defined scripts or actions
when an alert is received in AlarmsOne.

Automate your workflow

[Free e-book] Five revenue metrics
every MSP should track


Ready for a reality check? Here are five revenue metrics to help you
see how profitable your business truly is.

Track your profits

New in Applications Manager


Track key metrics like throughput, latency, and throttled requests
right from Applications Manager.

Data on Dynamo

Take control of your network logs


Read our handbook to learn how to audit your network perimeter logs
using a SIEM solution.

No-nonsense network

Monitor your VMware
datastores from the cloud


Storage, latency, snapshot size—what other VMware vSphere
datastore metrics will you monitor?

Dig into datastores

Essential Office 365 best practices


Plug the security gaps in your Office 365 setup to safeguard against potential threats.

Secure your setup

Access management cheat sheet for making your files, folders, and shares bulletproof


Improve security and ensure regulatory compliance using a single pane for access permissions management and reporting.

Address your access

Troubleshoot from anywhere at any time


Enter Remote Access Plus, our new solution for troubleshooting
Windows, Mac, and Linux computers.
With advanced remote control and over a dozen tools,
you can quickly resolve any IT incident.

Ready to go remote?

We’re thrilled to be positioned in the first Gartner Magic Quadrant for UEM


Desktop Central was recognized for its easy-to-navigate interface
and lower price point than many other UEM vendors.

Quite the quadrant

OpManager emerges as a leader in
network monitoring


Read why Info-Tech gave OpManager a gold medal in its
Network Monitoring Category Report.

Go for gold

Flow data: How to configure and monitor it September 25, 2018 Register »
Network monitoring: Doing it the smart way September 26, 2018 Register »
Top five tips for Office 365 security and compliance September 26, 2018 Register »
This month’s top blog posts
Less is more: Role-based performance monitoring with OpManager
Industry best practices for endpoint security
Lessons from one of the first major data breaches in a post-GDPR Europe
“Ok Google, what does Android Pie have in store for enterprises?”
Five worthy reads: The “edge” is near!
Sign up for our blog digest

August Newsletter – 2018

Please add to your address book | View online version

August, 2018

London UserConf ’18: Learn from the people behind the tools you love


Don’t miss live demos, one-on-one sessions with experts, product certification, and more.

Get your free pass

Think your network is secure? 
Think again


Spot anomalies, contain threats, protect confidential information, and defend against attacks, all with SIEM. Read our complete guide to SIEM to get secure.

Sink or SIEM

Most breaches are caused by passwords.
What’s your plan?


 Read our e-book to learn how to mitigate password risks and secure your Windows enterprise by enabling two-factor authentication.

A plan of action

Do you want to find vulnerable devices
in your network?


 Quickly search your network for vulnerable devices and upgrade to the latest firmware using Network Configuration Manager’s hardware inventory list.

 Search and secure

ServiceDesk Plus adds more GDPR features
and a new integration


Privileged access management, GDPR-specific features, scripts for business rules—all this and more, right in the latest version of
your service desk.

Movin’ on up

What’s new with Applications Manager 
and Azure


Applications Manager now provides out-of-the-box support for popular relational database-as-a-service Azure SQL Database.

Azure for sure

Free solution guide on tightening your
endpoint security


Learn how ManageEngine’s endpoint management solutions can safeguard your systems against vulnerabilities.

Amazing EMS

An easier way to report on your Skype for Business servers


Bid adieu to the Lync Server Control Panel and use Exchange Reporter Plus’ granular Skype for Business reports instead.

Simplify Skype

Is your PAM strategy complete?


Learn why SSH keys and SSL certificates are as critical as passwords when it comes to managing privileged access.

 A plan for PAM

OpManager introduces a seamless
integration with AlarmsOne


Leverage AlarmsOne’s alert management capabilities to effectively manage OpManager alerts with ease.

Alarmingly good

Automate user management in
Active Directory using HR data


ADManager Plus integrates with HR databases to facilitate
hands-free creation, modification, and deletion of user accounts in AD, Office 365, Exchange, Skype for Business, and G Suite.

HR meets AD

Get unmatched visibility into how your 
web applications behave


Deep insights into application performance—from URLs to SQL queries—at your fingertips. Assist your DevOps team in resolving performance issues, no matter where they originate.

A tool for developers

Millions of mobile devices affected by new Bluetooth vulnerability


Learn how Mobile Device Manager Plus can help protect your organization’s mobile devices against CVE-2018-5383.

 Avoid the Bluetooth blues

The power of password self-service Aug 22, 2018 Register »
Auditing 101: Stay compliant and secure your enterprise with SIEM Aug 23, 2018 Register »
Free training on network configuration manager – Get compliant today Aug 28, 2018 Register »
This month’s top blog posts
Three ways to protect your enterprise from network issues
Why securing your roaming users’ endpoints is important
Five worthy reads: Data security begins at home
Synchronize employees’ G Suite and Active Directory passwords to avoid password reset tickets
Sign up for our blog digest