Operations | Monitoring | ITSM | DevOps | Cloud

South Africa's GDPR: The POPI Act and it's impact on Desktop Central users

The Protection of Personal Information (POPI) Act puts South Africa’s data regulation standards on par with existing data protection laws around the world. It aims to protect personally identifiable information (PII), enforce individuals’ rights to privacy, and provide guidelines for lawfully processing sensitive information and notifying regulators and data holders in the event of a breach.

Five worthy reads: How augmented data management can pave the way for better decision-making

As there are more advances in data use, businesses must ensure they’re delivering value by utilizing all data sources present in their environments. Irrespective of the source of data, be it operational or transactional systems, smart devices, social media, video, or text, it’s what the business does with the data available that determines its value strategy.

ManageEngine launches M365 Security Plus, an exclusive security solution for Microsoft 365

Data is the cornerstone of most businesses. Companies handle a substantial amount of data every day, and just one data breach can result in compliance violations, lawsuits, and more, costing the company thousands of dollars. Here at ManageEngine, we believe that part of what makes a business successful is having an efficient security solution. Taking that one step further, we have designed the perfect security solution for Microsoft 365: M365 Security Plus.

ITOM podcast episode 1 is out! Learn the basics of VPNs to enable your remote workforce

The wait is finally over. The first episode of our weekly podcast series aimed to alleviate all your remote work hassles is out. The efficacy of remote operations depends on a robust virtual private network (VPN). VPNs help facilitate remote work by acting as a conduit between an organization’s remote workers and its private network. VPNs ensure a safe passage for the transmission of business-critical data and grants end users access to on-premises services to maintain operational continuity.

5 tips to avoid cyberattacks on EdTech platforms

As the COVID-19 pandemic rages on, many educational institutions have been forced to shift their on-campus classes to online classes. Various EdTech platforms have also launched free classes that have prompted students to try their hands on digital education. With more students turning to online learning than ever, these platforms have emerged as a lucrative target for cybercriminals.

The NIST Cybersecurity Framework: 5 core functions and how to align with them using AD360

The Cybersecurity Framework (CSF) was developed by the National Institute of Standards and Technology (NIST), a division of the U.S. Department of Commerce. This framework was created through collaboration between various private-sector and government experts to provide high-level taxonomy of cybersecurity outcomes and a methodology to assess and manage those outcomes.

Monitoring NGINX with Applications Manager

NGINX is open-source software that started out as a web server and now provides various solutions such as web serving, reverse proxying, caching, load balancing, media streaming, and more. It also serves as a proxy server for email (IMAP, POP3, and SMTP) and a reverse proxy and load balancer for HTTP, TCP, and UDP servers.

Get a live view of network performance with OpManager's Real-time Dashboard

Although network monitoring is an unenviable task, it must be done to sustain your network’s health. But what if you had a real-time report containing only key metrics, revealing how your network is doing without overloading you with information? This would (1) assure you that there are no aberrations in your network and (2) give you peace of mind.

We studied how the pandemic has affected ITSM - here are the results

As the world moves towards the “new normal” on account of the pandemic, numerous adjustments and recalibrations have been made in all aspects of our lives, including the organizations we are part of. As businesses base their operations on a dispersed workforce beyond the corporate perimeter, IT teams have been the ones largely enabling this successful migration to home workspaces and further sustaining the remote network to foster productivity.