Operations | Monitoring | ITSM | DevOps | Cloud

December 2019

G2 recognizes ManageEngine as a High Performer in the Unified Endpoint Management (UEM) category for Winter 2020

ManageEngine’s unified endpoint management solution,, Desktop Central, has been recognized as a High Performer and Momentum Leader in G2’s winter report for 2020. This is the second time in the past six months that Desktop Central has been named a High Performer in G2’s Unified Endpoint Management category.

StrandHogg vulnerability threatens 500 of the most popular Android apps

Earlier this month, security researchers at Promon, a Norwegian firm that specializes in in-app security, uncovered a unique vulnerability in Android devices that allows malicious apps to masquerade as legitimate apps and prompt for intrusive permissions that allow them to: Listen to the user through the microphone, Take photos using the camera, and a lot more.

ServiceDesk Plus named Contender in the Enterprise Service Management space by independent research firm

Forrester has recognized ManageEngine as a contender in the Enterprise Service Management (ESM) space in its latest Forrester Wave: Enterprise Service Management, Q4 2019 report. The report covered twenty-three criteria and recognized fifteen providers in the ESM space.

ManageEngine recognized as November 2019 Gartner Peer Insights Customers' Choice for IT service management tools

ServiceDesk Plus, ManageEngine’s flagship ITSM software, has helped over 100,000 service desks around the globe streamline and efficiently manage their IT service management processes. Now, we’re excited to announce that we’ve been recognized as a Gartner Peer Insights Customers’ Choice for IT service management tools! This is a testament to the extensive ITSM capabilities of ServiceDesk Plus.

What is vulnerability management and why should enterprises adopt it?

In the current digital era, enterprises across the world heavily rely on information systems for day-to-day operations and for accessing business-related data. In essential institutions, such as banking and financial, health, and government, protecting information is critical and any security mishap could disrupt daily operations. The intention of attackers is to either deny services until a ransom is paid or breach security to gain access to critical information.

Five worthy reads: The privacy implications of AI

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we explore the relationship between AI and data privacy. From smart devices and voice assistants to mediating traffic and enhancing personalized shopping experiences, artificial intelligence (AI) has found widespread application in many aspects of life.