Latest Posts

Five worthy reads: The business benefits of serverless computing

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we explore serverless computing and how it can impact business operations.

The introduction of cloud computing in the late …

ManageEngine 2 min read

Help us understand and measure your SOC performance [Survey]

What gets measured gets managed. You probably intuitively sense the truth in that statement, but are you practicing it? Specifically, are you measuring your security operations center’s (SOC) performance?

Measuring the IT security team’s performance has always been subjective. With …

IT Security 2 min read

Five worthy reads: AI and ML: Keys to the next layer of endpoint protection

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we’ll talk about why incorporating AI into your UEM strategy may be inevitable. 

When businesses first started using mobile …

ManageEngine 3 min read

File server auditing: Excluding certain files and file types

In order to improve the efficiency of audit reports, administrators auditing a file server may decide not to monitor certain files and file types. With ADAuditPlus’ Exclude Configuration feature, certain files and file types can be excluded from auditing without …

Active Directory 1 min read

Microsoft Patch Tuesday updates for February 2019

Microsoft has just released this month’s security updates for its products. Before getting on with the list of applications that got fixes this Patch Tuesday, here are the patch figures: 76 vulnerabilities were addressed of which 20 are rated critical, …

Desktop Central 2 min read

ROI calculators for software: Common problems and our uncommon solution

Often, organizations use ROI calculators to determine the return on investment for using its software. However, the soft benefits—metrics that add value but can’t be measured—cannot be quantified through an ROI calculator, and including them will yield inaccurate results. Many …

General 2 min read

Tracking insider threats with AI

If you thought masked hackers in dark rooms spreading malware were your only security concern, think again. In its Insider Threat Report for 2018, Crowd Research Partners brought to light that almost 90 percent of organizations find themselves vulnerable …

ADAudit Plus 1 min read

Thwart password spray attacks to secure employee access to cloud apps

Chances are you’ve heard of traditional credential-based attacks on Active Directory (AD) and cloud applications—brute force attacks, dictionary attacks, and keylogging, to name a few. There’s now another attack type you should familiarize yourself with: password spray attacks. In this …

General 2 min read

Telecommuting is catching up fast—it’s on you to empower your workforce

According to Upwork’s Future Workforce Report, fifty-five percent of the surveyed managers agree that remote work among full-time employees is more common now. These same managers say they expect up to thirty-eight percent of their full-time workers will work …

Active Directory 2 min read

Five worthy reads: Augmented analytics paves the way

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we look at the rise of augmented analytics and how it tackles the ever growing need for intelligent, data-driven

General 3 min read