Dalam tahun ke 8 kami memegang produk ini, hal menarik kami temukan. Yang pertama adalah pengguna sistem helpdesk sekarang tidak hanya lingkungan IT saja, melainkan telah meluas ke bidang lain. Kami menemukan beberapa kenyataan penggunaan meluas dari ServiceDesk Plus yang digunakan tidak hanya untuk support user di lingkungan IT, tetapi juga di unit kerja lain. Ada beberapa yang menggunakannya untuk Call Center untuk mendukung customer. Ada yang menggunakannya untuk unit frontdesk yang berhubungan langsung dengan nasabah / customer. Bahkan a…
Control USB Devices Block/Disable USB Devices in the Network Today, the usage of portable devices is a growing reality. It poses two main concerns to organizations: a threat of data theft and the possiblity of viruses and Spyware these devices can bring into the network. Desktop Central's Secure USB feature would help administrators limit the scope of USB device usage, selectively based on the various roles and departments. Secure USB feature enables administrators to centrally control the usage of various USB devices in the ne…
We are happy to announce the latest hotfix to Desktop Central 8 - Build 80226. Here's the complete list of enhancements & bug fixes over previous hotfix: Enhancements USB Audit, a new feature, has been added to audit the usage of USB devices in the network. A new profile to configure the Access Point has been added for iOS devices. Ability to restrict the access of data based on its ratings has been included for iOS devices. Patch Scanning has been optimized to reduce the CPU/memory usage and scanning time. Patch Depl…
Business priorities: what to protect, monitor and test Peter Wood Information security and IT professionals are being swamped with new challenges that appear to have no easy answers. Cloud , social networking and bring your own device (BYOD) are obvious concerns, and there are many more equally complex scenarios. Yet budgets and resources are limited. How do you decide what to focus on? Which systems need additional protection or monitoring? What should we test and how? The business wants to take advantage of the c…
Open source network monitoring: SLAs push network pros to new tools By Heather Clancy, Contributor As virtualized infrastructure and cloud computing force businesses to reevaluate the broader issue of acceptable network service levels, open source network monitoring tools are attracting heightened interest. Both network administrators and open source advocates say the flexibility these tools promise at a relatively reasonable cost has made them a viable alternative to software offered by some of the largest enterprise technology c…
Top seven network traffic monitoring challenges Richard Bejtlich Network traffic monitoring is often touted as a way for enterprises to meet performance, security and compliance goals. But implementing network traffic monitoring tools can also pose a series of challenges that range from difficulty in creating network baselines to trouble finding the right tools and strategies for monitoring content in a proxied environment. Here are the top seven networking traffic monitoring challenges: Challenge 1: Network baselines. Freq…
Social Plugin