Applications Manager | September 19, 2018Learn how Applications Manager can help monitor the performance of Microsoft apps at Ignite 2018It's time again for Microsoft Ignite! Thousands of the tech industry's brightest minds will descend on Orlando next week, looking for conversations...
General | September 18, 2018There's more to password security than hashed passwordsIn 1967 Roger Needham, one of the first computer scientists to emphasize the need for computer security,...
Key Manager Plus | September 17, 2018Chrome's removing the "Secure" label from HTTPS sites—but why? Gone are the days when the green "Secure" label stood to distinguish legitimate websites from potentially...
General | September 14, 2018Five worthy reads: Is your business safe from business email compromise?Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and...
Identity and access management | September 13, 2018Instantly restore AD objects to any previous versionThere are multiple reasons for restoring an Active Directory (AD) object to a previous...
Endpoint Central | September 12, 2018Patch Tuesday updates for September 2018The September edition of Patch Tuesday includes fixes from Microsoft for 61 security...
Mobile Device Manager Plus | September 5, 2018What is mobile device management, and why will it enhance enterprise IT security? Technological advancements aren't hard to find. Just look at how huge CRT monitor...
General | September 4, 2018Secure access to multiple enterprise applications! ADSelfService Plus makes it twice as safe.Enterprise applications have become an integral part of a tech user's life. Although the...
General | September 4, 2018Simplifying security auditing, Part 4: Securing web servers Web servers are front-end facing applications that are vital for the daily operations of...
General | August 31, 2018Five worthy reads: Rise of the no-collar cultureFive worthy reads is a regular column on five noteworthy items we’ve discovered while...