Cool Solutions

Security

Gartner Peer Insights – ZENworks Configuration Management

Gil Cattelain

By:

November 8, 2018 4:06 pm

Reads:668

Score:Unrated

To all ZENworks Configuration Management customers: Gartner Peer Insights recently announced the Customers’ Choice Award for the Client Management Tools market that will be published soon. Because we value authentic feedback from our customers on ZENworks Configuration Management, would you be willing to write a short review on Gartner Peer Insights? Gartner Peer Insights is an online …

+read more

Tags: , , ,
Categories: Configuration Management, Endpoint Security, Expert Views, General, IT Operations Management, Mobile, PR Blog, Security, Technical, Unified Endpoint Management, ZENworks

Check out what’s new in the latest versions of Service Desk and #ZENworks Mobile Workspace

jblackett

By:

October 30, 2018 4:30 pm

Reads:441

Score:Unrated

Join us for the ZENworks community webinar on November 14th @ 9:00 Mountain Time where we’ll hear from Sudipta Roy and Vikram Goyal on these two latest updates to the Endpoint Management portfolio. Come check out the new end-user interface for ZENworks Service Desk and see how these products can help enhance you use cases. …

+read more

Tags: ,
Categories: Collaboration, Endpoint Security, IT Operations Management, Mobility, Security, Service Desk, Service Management, Technical, ZENworks Mobile Workspace

Using #ZENworks to Distribute MacOS Management Profiles

jblackett

By:

October 25, 2018 1:00 pm

Reads:458

Score:Unrated

Over the last little while I’ve had several questions about whether you can use ZENworks to deploy MacOS profiles. While it’s true that at this time ZENworks doesn’t yet support the native MDM-based deployment method for applying management profiles, it is possible to distribute profiles in another fashion. This solution looks at how to use …

+read more

Tags: , ,
Categories: Configuration Management, Endpoint Security, IT Operations Management, Mobile, Security, Technical, Unified Endpoint Management, ZENworks, ZENworks Configuration Management

What You Missed at the Micro Focus Cybersecurity Summit 2018

Gil Cattelain

By:

October 8, 2018 1:48 pm

Reads:639

Score:Unrated

IT teams have to deal with and manage a preponderance of security-related concerns in order to ensure their employees are able to work effectively in today’s mobile-centric environment.  A significant part of that includes managing and maintaining security and compliance standards across a wide array of endpoints while enabling access to corporate applications and resources. …

+read more

Tags: , ,
Categories: Endpoint Security, Expert Views, General, Security, Technical, Unified Endpoint Management, ZENworks

GDPR and the File Governance Suite

qmangus

By:

October 3, 2018 9:55 am

Reads:769

Score:Unrated

General Data Protection Regulation (GDPR) is a set of requirements, recently enacted in Europe, designed to protect data from breaches and help to ensure privacy. GDPR requires that all European companies comply with the following: Data protection: Companies must have policies, processes, and technology in place to ensure that data stays secure and protected. Data consent …

+read more

Tags: , , , , , , ,
Categories: File Analysis & Management, File Dynamics, File Reporter, Security

Configuring Proxies for Hybrid Domains within ZENworks Mobile Workspace



By:

September 26, 2018 3:52 pm

Reads:739

Score:Unrated

This document provides information on how to configure proxies for hybrid domains within ZENworks Mobile Workspace (ZMW). In this scenario, one domain is created for an on-premises mail server and the other for an Office 365 mail server, located in the cloud. To connect ZMW…

+read more

Tags: , , , , ,
Categories: Collaboration, Endpoint Security, IT Operations Management, Mobile, Mobility, Security, Technical, Unified Endpoint Management, ZENworks, ZENworks Mobile Workspace

Monitor ZENworks Services using Java VisualVM from a remote system

Ravish G

By:

September 25, 2018 9:38 am

Reads:812

Score:5

Ravish G. explains how to configure Java VisualVM so you can monitor ZENworks Services from a remote system. Java VisualVM allows you to generate and analyze heap dumps, track down memory leaks, browse the platform’s MBeans and perform operations on those MBeans…

+read more

Tags: , ,
Categories: Cool Tools, Endpoint Security, IT Operations Management, Security, Technical, Unified Endpoint Management, ZENworks

Simplifying IT Functions with Unified Endpoint Management Tools

Gil Cattelain

By:

September 20, 2018 10:15 am

Reads:703

Score:Unrated

Enterprise IT managers are faced with the modern reality of managing both corporate- and employee-owned endpoints running different versions of different operating systems, making an already challenging job nearly impossible.  With constant updates to security solutions, operating systems, and applications, even simply trying to keep up with the latest versions quickly becomes an exercise in …

+read more

Tags: , , , ,
Categories: Endpoint Security, Expert Views, General, IT Operations Management, PR Blog, Security, Technical, Unified Endpoint Management, ZENworks

Don’t Let Ransomware Take You Down – Use File Dynamics

qmangus

By:

September 7, 2018 10:04 am

Reads:1,577

Score:Unrated

Ransomware continues to be a threat across the globe, with hackers targeting an organization’s most valuable files and systems and locking them down. Then they ask for money, or a “ransom,” to unlock these systems. To avoid the high cost of downtime associated with this cybercrime, many organizations simply pay the ransom. Unfortunately, the occurrence …

+read more

Tags: , , , , , , , ,
Categories: Expert Views, File Analysis & Management, File Dynamics, File Services and Management, Information Management & Governance, Security

RSS