Our Blog

Home / Blog

ENHANCED BUSINESS APPLICATION FUNCTIONALITY AND MORE IN V17.02.00

ENHANCED BUSINESS APPLICATION FUNCTIONALITY AND MORE IN V17.02.00

Update Overview As part of our effort to expand application dependency analysis for our customers,  Device42 v17.02.00 includes enhancements to our Business Application functionality and editing canvas. v17.02.00 also includes updates to storage array and SNMP...

Make application readiness a part of your IT ecosystem

Make application readiness a part of your IT ecosystem

Do you have a Windows migration coming up? You’ve already done that? Then all your application packaging needs are done and you can just forget about your applications. Just kidding. Tending to the updates necessary for existing applications need just as much love (or...

Malware family naming hell is our own fault

Malware family naming hell is our own fault

EternalPetya has more than 10 different names. Many do not realize that CryptoLocker is long dead. These are not isolated cases but symptoms of a systemic problem: The way we name malware does not work. Why does it happen and how can we solve it? Current state of...

The Digital Workspace in the Era of Cloud and Edge

The Digital Workspace in the Era of Cloud and Edge

The digital transformation poses major challenges for IT departments. Their tasks only become more complex in the face of flexible working conditions and the increase in the number of people working from home. And why is that? The IT department manages more than just...

IT Products 

Netsparker logo
Flexera Logo
Acunetix Logo
Forcepoint Logo
Snow Logo
Ivanti Logo
Progress - ipswitch Logo
Titus Logo
Solarwinds Logo
Endpoint Protector Logo
Kaspersky Logo
Hewlett Packard Enterprise logo
Boldonjames Logo
KnowBe4 Logo

OT Products 

Flexera Logo
Ondeso Logo
Forcepoint Logo
Ivanti Logo
Progress - ipswitch Logo
Kaspersky Logo
Splunk Logo
Symantec logo
CertNexus Logo
Tenable Logo
Rapid1 Logo
Nozomi Logo
G Data Software Logo