ADAudit Plus | July 4, 2019Monitoring user logon activity to identify compromised accountsIn a previous blog, we saw how ADAudit Plus' user behavior analytics (UBA) capabilities allow administrators to monitor the file activity of users to...
Log360 | July 1, 2019Five reasons to choose Log360, part 2: Multi-environment supportIn the previous post of this series, we looked at how easy it is to get Log360 up and running due to its...
General | June 28, 2019Top three reasons passwords are here to stay as the primary form of authenticationYahoo and cell phone companies like Samsung wanted to kill passwords in 2005 and 2014 respectively, yet in...
ADAudit Plus | June 28, 2019Unmask malicious insiders with user behavior analyticsInsider threats are both the most successful way to exfiltrate sensitive business data and the hardest...
Mobile Device Manager Plus | June 28, 2019Prevent downtime in your organization with Mobile Device Manager PlusIt goes without saying that downtime is bad for organizations—not only does it put...
ADSelfService Plus | June 27, 2019Bringing SSO to hybrid Active DirectoryAs enterprises transition to a hybrid Active Directory (AD) environment, it’s important...
General | June 26, 2019The why and how of browser securityThe internet has reshaped the workplace, and internet browsers have become an...
Log360 | June 24, 2019Five reasons to choose Log360, part 1: User-friendly deployment and UISIEM solutions are a must-have in any organization's security toolkit. They allow you to...
General | June 21, 2019Five worthy reads: Should NoOps be your new operations strategy?Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
Browser Security Plus | June 20, 2019Reported vulnerability in Evernote Web Clipper exposes browsing data of millions of usersA critical vulnerability in Evernote's Web Clipper Chrome extension recently allowed...