Unified Endpoint Management and Security: Breaking Down the Silos


Achuthan Ramesh, Senior Product Marketer, ManageEngine

Endpoint Management and Security

Consider the case of a smart home. Smart home systems offer life safety monitoring using carbon monoxide detectors, smoke detectors, and flood sensors along with home automation technology such as smart locks, smart thermostats, and smart bulbs. Now, imagine using a different tool for each of the above smart home capabilities—suddenly, smart homes don’t seem … Read more

How Can Organizations Prioritize Data Privacy Through Encryption?


Waqas S, Cybersecurity Journalist, DontSpoof

Data Privacy - Encryption

Rapid technological advancements have transcended data in value, making it highly significant to individuals and organizations. With that being said, despite the many regulations protecting data rights, such as the General Data Protection Regulation (GDPR), the Data Protection Act (DPA), and the Health Insurance Portability and Accountability Act (HIPAA), there are still multiple threats to … Read more

Fortify Your Network Against USB Threats by Implementing Device Control


Sathya R, Product Specialist, ManageEngine

USB devices and device control

How important is it to protect your organization from USB threats? USB devices are a popular choice when it comes to transferring data, but they can pose significant security risks for your organization. The plus points of USB devices are their size and efficiency; however, if these devices aren’t monitored or restricted appropriately, all it … Read more


Securing Endpoints: The Gateways to Your Enterprise


Nikhil Narayan, Product Marketer, ManageEngine

Securing Endpoints - Network

Endpoints across an IT network lay the foundation of every modern-day enterprise.  These endpoints, comprising of laptops, desktops, and mobile devices that connect to the business’s network are seen by malicious actors as potential gateways for data breaches and malware intrusions. According to a study released by Quantitative, the average cost of a data breach … Read more

From the Summer 2021 Issue

How to Decide a Safe and Suitable Business Model in a COVID-19 World for Your Business


Glenn Axelrod, M.Sc. IT, CISA, CISM, CRISC, Senior Information Technology Consultant , HKA Technology Solutions, L.L.C.

How to Decide a Safe and Suitable Business Model in a COVID-19 World for Your Business

Over the last ten years, remote work has increased by more than 100%; between 2017 and 2018, telecommuting increased by more than 20%. The COVID-19 pandemic altered our working environment, and some businesses discovered that they were unable to transition to a fully remote or hybrid workforce model. At the start of the COVID-19 pandemic, … Read more

The Principle of Least Privilege: The Whats, the Whys, and the Hows


Ameera Azeez, Product Specialist, ManageEngine


According to a recent infographic, in 2020 more than 70% of cybersecurity breaches happened due to the misuse of privileges. This emphasizes the need for the enterprise-wide elimination of unnecessary privileges, which is exactly what the Principle of Least Privilege (PoLP) advocates. Here is a detailed breakdown of what this principle means for organizations and … Read more

Avoiding Rough Patches Using Patch Management


Aritri Saha, Content Writer, ManageEngine

Patch Management - Patches

Patch management is an essential part of sustaining IT services in this era of malware and growing cyber threats. Letting your guard down in network security makes your organization an easy target for cybercriminals. The responsibility for keeping the network safe and guarded is a herculean task, but automating the process can make any system … Read more

From the Winter 2021 Issue

Still Looking for Cyber Solutions for the Same Cyber Problems


Colby Proffitt, Cybersecurity Strategist, Netskope

Real Time Data

Real-time data, not more tools, critical to reduce risk and make better cyber decisions The job of the Chief Information Security Officer (CISO) has become much more complex over the last decade. With every advance in technology, the amount of risk facing most organizations has also increased. CISOs – as well as Chief Risk Officers … Read more