G2 recognizes ManageEngine as a High Performer and the Momentum Leader in UEM 

Managing devices and offering the security customers expect is what makes ManageEngine stand apart in the unified endpoint management (UEM) category. Our UEM offering, Desktop Central, delivers a wide range of features addressing all endpoint-based challenges. Desktop Central is under continuous development and offers support to evolving operating systems, hardware, applications, and technology.  G2, a…

Five worthy reads: Cybersecurity drift: Leveraging AI and ML to safeguard your network from threats

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, sticking with October’s cybersecurity awareness theme, we’ll take an in-depth look at both the good and the bad of artificial intelligence (AI) and machine learning (ML) in cybersecurity. It’s that time of year when everyone’s talking about cybersecurity and spreading awareness on the importance of…

Fast-track bulk Office 365 object creation with O365 Manager Plus

User account creation is a long-winded process that involves various configurations. Such a tiresome, manual process is naturally prone to errors, especially while creating user accounts in bulk. Errors made in the user provisioning process will result in frustrated users calling the service desk to request permission to access resources, to be added to the appropriate groups, to update missing profile details, etc. Why provisioning users through the Admin Center is inefficient Though…

Notify users about their random passwords via SMS

In a previous blog, we saw why generating random passwords is key to securing new user accounts for your Active Directory environment. But random passwords for new user accounts also need to be securely transmitted to the end user. In this blog, you’ll learn how to securely notify users about their random passwords using ADManager Plus. When configuring new user accounts manually in ADManager Plus, random passwords…

Five BYOD challenges IT teams face and ways to mitigate them

BYOD stands for bring your own device, whereby your organization lets employees use personal devices for day-to-day work. Sounds simple, right? Unlike corporate devices where the enterprise has complete freedom to choose users’ device types and platforms, BYOD is a different case altogether. In BYOD environments, employees often use different devices manufactured by different OEMs running on multiple OS versions. In such a scenario, there’s no one-size-fits-all approach to managing these various BYOD devices.…

Five worthy reads: Cybersecurity drift: Leveraging AI and ML to safeguard your network from threats

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, sticking with October’s cybersecurity awareness theme, we’ll take an in-depth look at both the good and the bad of artificial intelligence (AI) and machine learning (ML) in cybersecurity. It’s that time of year when everyone’s talking about cybersecurity and spreading awareness on the importance of…