Mobile Device Manager Plus | June 28, 2019Prevent downtime in your organization with Mobile Device Manager PlusIt goes without saying that downtime is bad for organizations—not only does it put business-critical data at risk and hamper employee productivity,...
ADSelfService Plus | June 27, 2019Bringing SSO to hybrid Active DirectoryAs enterprises transition to a hybrid Active Directory (AD) environment, it’s important that they address...
General | June 26, 2019The why and how of browser securityThe internet has reshaped the workplace, and internet browsers have become an indispensible tool for today's...
Log360 | June 24, 2019Five reasons to choose Log360, part 1: User-friendly deployment and UISIEM solutions are a must-have in any organization's security toolkit. They allow you to analyze events from...
General | June 21, 2019Five worthy reads: Should NoOps be your new operations strategy?Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
Browser Security Plus | June 20, 2019Reported vulnerability in Evernote Web Clipper exposes browsing data of millions of usersA critical vulnerability in Evernote's Web Clipper Chrome extension recently allowed...
General | June 18, 2019Boost your organization's productivity with these 5 password management techniquesFor some time now, many organizations have claimed they'd go password-less. Even tech...
Applications Manager | June 14, 2019How to tackle commonly encountered issues in applications with web application monitoring How to monitor web applications Unless there's been a huge breakthrough in technology...
Mobile Device Manager Plus | June 12, 2019Mobile Device Manager Plus is here to make your service desk more efficientOn an average day, help desk technicians battle against forgotten passwords, never-ending...
Endpoint Central | June 12, 2019Microsoft Patch Tuesday June 2019: 88 vulnerabilities to fix, but how?Every Patch Tuesday is a nightmare for IT admins, loading them with a bundle of updates,...