• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Latest Stories

Detecting first time processes on member servers to protect against attacks

ADAudit Plus | July 17, 2019

Detecting first time processes on member servers to protect against attacks

In a previous blog, we saw how ADAudit Plus’ user behavior analytics (UBA) capabilities allow administrators to monitor user logon activity to...

Complying with NIST password guidelines

ADSelfService Plus | July 16, 2019

Complying with NIST password guidelines

Passwords are the most widely used form of authentication across the globe and serve as the first line of...

Log360 | July 15, 2019

Five reasons to choose Log360, part 4: Advanced security features

Part two and part three of this blog series gave a detailed look at Log360's in-depth auditing capabilities,...

Agent Smith materializes from the matrix of Android malware

Mobile Device Manager Plus | July 12, 2019

Agent Smith materializes from the matrix of Android malware

There’s a new shapeshifting strain of Android malware in the mix. It replaces legitimate apps with compromised...

Featured

AIOps whitepaper is now live

IT operations management and observability

[White paper] AIOps 2.0: The future of resilient IT operations is here

ServiceDesk Plus

[Watch now] Supercharging ITSM with ITOM integration

ServiceDesk Plus

[Free e-book] ITSM doesn’t have to be a struggle—simplify it with ITOM integration

CloudSpend

AWS Lambda’s INIT billing update: What’s changing and why it matters for your cloud costs

ITOM-ITSM integration webinar

ServiceDesk Plus

[Webinar] ITOM and ITSM: A unified approach to incident, asset, and change management

Patch Manager Plus | July 10, 2019

Microsoft Patch Tuesday July 2019: Six publicly disclosed vulnerabilities, two zero-day flaws

The much awaited Microsoft Patch Tuesday updates for July 2019 are here. If you're a...

Log360 | July 8, 2019

Five reasons to choose Log360, part 3: Comprehensive network auditing

In the previous post, we discussed the various environments that Log360 helps you audit...

Five worthy reads: Educating the education sector on cybersecurity

General | July 5, 2019

Five worthy reads: Educating the education sector on cybersecurity

Five worthy reads is a regular column on five noteworthy items we’ve discovered while...

Why litigation holds are not a viable alternative to backups

RecoveryManager Plus | July 5, 2019

Why litigation holds are not a viable alternative to backups

Microsoft does not provide backup and recovery tools for its Office 365 services and has...

Monitoring user logon activity to identify compromised accounts

ADAudit Plus | July 4, 2019

Monitoring user logon activity to identify compromised accounts

In a previous blog, we saw how ADAudit Plus' user behavior analytics (UBA) capabilities...

Five reasons to choose Log360, part 2: Multi-environment support

Log360 | July 1, 2019

Five reasons to choose Log360, part 2: Multi-environment support

In the previous post of this series, we looked at how easy it is to get Log360 up and...

Discover more

Featured

AIOps whitepaper is now live

IT operations management and observability

[White paper] AIOps 2.0: The future of resilient IT operations is here

ServiceDesk Plus

[Watch now] Supercharging ITSM with ITOM integration

ServiceDesk Plus

[Free e-book] ITSM doesn’t have to be a struggle—simplify it with ITOM integration

CloudSpend

AWS Lambda’s INIT billing update: What’s changing and why it matters for your cloud costs

ITOM-ITSM integration webinar

ServiceDesk Plus

[Webinar] ITOM and ITSM: A unified approach to incident, asset, and change management