AssetExplorer | August 23, 2019AssetExplorer gains an edge over other ITAM softwareWe have excellent news to share with you today. AssetExplorer, our IT asset management (ITAM) solution, has been named the Best Enterprise ITAM...
ADSelfService Plus | August 22, 2019How to make password management more secure and efficientAmong the various tasks that IT administrators carry out on a daily basis, password management takes center...
General | August 22, 2019There's more than one way to get admin privilegesActive Directory (AD) was introduced to the IT world in the mid-1990s, and it has come a long way since then,...
Log360 | August 20, 2019Keeping up with compliance regulations like the GDPR and CCPA - Free webinarThe EU's GDPR and California's CCPA are two of the world’s most prominent data regulations. Similar laws have...
ADSelfService Plus | August 19, 2019Managing updates to local cached credentials for remote users in a hybrid Active Directory environmentAmong the many issues remote users face, forgotten passwords can be a significant...
General | August 14, 2019Microsoft Patch Tuesday August 2019: WannaCry-level “wormable” flaws patchedNo matter how prepared you are, Patch Tuesday never fails to throw in a surprise. With the...
Identity and access management | August 13, 2019Active Directory authentication protocols and security risksFor organizations to maintain security and reduce their threat exposure, it's critical to...
Log360 | August 12, 2019Zooming in on UEBA: Answering the "what" and the "how" What is UEBA? User and entity behavior analytics (UEBA) is a relatively new category of...
ADSelfService Plus | August 9, 2019Azure AD Password Protection: The good, the bad, and the uglyPeople often use common words as their passwords so they don’t forget them. This practice...
ADAudit Plus | August 8, 2019Find out which of your employees pose the greatest security riskAmong the different types of cyberattacks, insider threats are the hardest to track and...