• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Latest Stories

Monitoring user logon activity to identify compromised accounts

ADAudit Plus | July 4, 2019

Monitoring user logon activity to identify compromised accounts

In a previous blog, we saw how ADAudit Plus' user behavior analytics (UBA) capabilities allow administrators to monitor the file activity of users to...

Five reasons to choose Log360, part 2: Multi-environment support

Log360 | July 1, 2019

Five reasons to choose Log360, part 2: Multi-environment support

In the previous post of this series, we looked at how easy it is to get Log360 up and running due to its...

Top three reasons passwords are here to stay as the primary form of authentication

General | June 28, 2019

Top three reasons passwords are here to stay as the primary form of authentication

Yahoo and cell phone companies like Samsung wanted to kill passwords in 2005 and 2014 respectively, yet in...

Unmask malicious insiders with user behavior analytics

ADAudit Plus | June 28, 2019

Unmask malicious insiders with user behavior analytics

Insider threats are both the most successful way to exfiltrate sensitive business data and the hardest...

Featured

ServiceDesk Plus

[Watch now] Supercharging ITSM with ITOM integration

ServiceDesk Plus

[Free e-book] ITSM doesn’t have to be a struggle—simplify it with ITOM integration

CloudSpend

AWS Lambda’s INIT billing update: What’s changing and why it matters for your cloud costs

ITOM-ITSM integration webinar

ServiceDesk Plus

[Webinar] ITOM and ITSM: A unified approach to incident, asset, and change management

General

Top tips: Keep AI chatbots out of your business!

Prevent downtime in your organization with Mobile Device Manager Plus

Mobile Device Manager Plus | June 28, 2019

Prevent downtime in your organization with Mobile Device Manager Plus

It goes without saying that downtime is bad for organizations—not only does it put...

Bringing SSO to hybrid Active Directory

ADSelfService Plus | June 27, 2019

Bringing SSO to hybrid Active Directory

As enterprises transition to a hybrid Active Directory (AD) environment, it’s important...

The why and how of browser security

General | June 26, 2019

The why and how of browser security

The internet has reshaped the workplace, and internet browsers have become an...

Five reasons to choose Log360, part 1: User-friendly deployment and UI

Log360 | June 24, 2019

Five reasons to choose Log360, part 1: User-friendly deployment and UI

SIEM solutions are a must-have in any organization's security toolkit. They allow you to...

Five worthy reads: Should NoOps be your new operations strategy?

General | June 21, 2019

Five worthy reads: Should NoOps be your new operations strategy?

Five worthy reads is a regular column on five noteworthy items we’ve discovered while...

Reported vulnerability in Evernote Web Clipper exposes browsing data of millions of users

Browser Security Plus | June 20, 2019

Reported vulnerability in Evernote Web Clipper exposes browsing data of millions of users

A critical vulnerability in Evernote's Web Clipper Chrome extension recently allowed...

Discover more

Featured

ServiceDesk Plus

[Watch now] Supercharging ITSM with ITOM integration

ServiceDesk Plus

[Free e-book] ITSM doesn’t have to be a struggle—simplify it with ITOM integration

CloudSpend

AWS Lambda’s INIT billing update: What’s changing and why it matters for your cloud costs

ITOM-ITSM integration webinar

ServiceDesk Plus

[Webinar] ITOM and ITSM: A unified approach to incident, asset, and change management

General

Top tips: Keep AI chatbots out of your business!