IT-Topics to read and explore
Microsoft Endpoint Manager – Security standards for all
Everyone knows that IT administrators take care of the digital security of the system landscape and, in the process, use guidelines to eliminate security risks. However, a bad and careless driver who doesn’t follow the rules puts everyone on the road at risk. Smartphones and other private mobile devices are nothing unusual in corporate networks. By using these devices, anyone can easily and quickly access emails or “Teams messages” from anywhere.
Software distribution using Windows Tools
Software distribution is a central part of IT administration. It ensures that all users within a company receive the applications and updates they need. In Windows environments, there are several methods of distributing software without additional costs or purchasing external software. In this article, we will look at the most important tools and methods for software distribution using Windows resources. [Read more…]
Zabbix – First Steps
In my previous Expert-Blog I explained why purchasing an IT monitoring solution is worthwhile for every company that uses IT systems. Today, I would like to describe a few basic things about monitoring software in concrete terms and show how it can support companies in monitoring their IT infrastructure after just the first steps.
Mobile Device Management – What does it do to our devices
Office, remote working, on the train, at the rest area, during the day and even while being asleep. The world has never been as interconnected as it is today. We live in the age of smartphones, tablets and whatever else may the future bring. TikTok and Instagram join Outlook and MS Teams with the indispensable security standard of multi-factor authentication (MFA) on smartphones. This is how work and private worlds are connected.
Monitoring Solutions – An Overview
If a system fails in production and no one notices, is there even a problem? Who doesn’t know the well-known thought experiment of the “falling tree in the forest”, which falls silently to the ground without an observer (perhaps?). For some reason, this was the first thing that came to mind when I was thinking about an introduction to IT monitoring.
Cloud Computing – Basics Explained
The term cloud computing refers to a model that enables companies and individuals to use IT resources over the Internet. Customers are granted access to computing services, storage space and/or applications without having to own them. Usage is generally device-independent, and billing is based on consumption. Cloud computing offers high scalability, cost efficiency and simplified accessibility.
[Read more…]