UEM
Five worthy reads: Preparing an incident response plan for the pandemic and beyond
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. With the rising concern over cyberattacks in the distributed workforce, this week we ...
UEM: Es tiempo de asegurar los navegadores de su empresa.
Al hablar de gestión unificada de endpoints (UEM – Unfied Endpoint Management), es usual que los administradores de TI piensen en computadoras, switches e incluso dispositivos móviles. Pero, ¿qué pasa con los ...
UEM: Improving Device Security for Remote Workers
UEM is finding its place in corporate security in the face of the work-from-home directive brought on by COVID-19 Amid the COVID-19 pandemic, teams all over the globe have had to adjust ...
Software Asset Management as a Security Practice
Software asset management (SAM) and documenting software license compliance has often been viewed as a necessary but tedious bookkeeping function that takes time from higher-priority security and operational IT tasks. But a ...

