Log360 | July 22, 2019Five reasons to choose Log360, part 5: Integrated compliance managementSo far in this blog series, we've seen how Log360 is simple to get up and running, allows you to receive a central view of multiple environments,...
OS Deployer | July 20, 2019What is Windows 10 migration, and how do you implement Windows 7 to Windows 10 migration? Windows 7 to Windows 10 migration Microsoft has announced end of life (EOL) for Windows 7, meaning...
General | July 19, 2019Five worthy reads: Is your enterprise dealing with data sprawl properly?Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and...
OpManager | July 17, 2019OpManager bags gold—listed in Feedspot's top networking blogs and sites to follow in 2019Great news! The OpManager blog has ranked #15 in Feedspot's top 100 networking blogs and websites to follow....
ADAudit Plus | July 17, 2019Detecting first time processes on member servers to protect against attacksIn a previous blog, we saw how ADAudit Plus’ user behavior analytics (UBA) capabilities...
ADSelfService Plus | July 16, 2019Complying with NIST password guidelinesPasswords are the most widely used form of authentication across the globe and serve as...
Log360 | July 15, 2019Five reasons to choose Log360, part 4: Advanced security featuresPart two and part three of this blog series gave a detailed look at Log360's in-depth...
Mobile Device Manager Plus | July 12, 2019Agent Smith materializes from the matrix of Android malwareThere’s a new shapeshifting strain of Android malware in the mix. It replaces legitimate...
Patch Manager Plus | July 10, 2019Microsoft Patch Tuesday July 2019: Six publicly disclosed vulnerabilities, two zero-day flawsThe much awaited Microsoft Patch Tuesday updates for July 2019 are here. If you're a...
Log360 | July 8, 2019Five reasons to choose Log360, part 3: Comprehensive network auditingIn the previous post, we discussed the various environments that Log360 helps you audit...