IT Security | August 15, 2018Simplifying security auditing, Part 1: Regularly reviewing server activity Everyone knows about the importance of log management in IT security. Yet, organizations struggle with implementing effective log management...
Mobile Device Manager Plus | August 15, 2018 "Ok Google, what does Android Pie have in store for enterprises?"From Android Enterprise to zero-touch enrollment, Google has recently been taking giant strides towards the...
Endpoint Central | August 15, 2018Patch Tuesday updates for August 2018Last month's edition of Patch Tuesday left many of us stranded since the patches it contained caused more...
Mobile Device Manager Plus | August 14, 2018Protect your data from the Bluetooth bug that has affected billions of devicesWith organizations still recovering from the damages caused by recent desktop malware attacks, like SamSam...
OpManager | August 13, 2018Less is more: Role-based performance monitoring with OpManager Much of a business' strength lies in its network infrastructure. One way to keep your...
Patch Manager Plus | August 10, 2018Microsoft Edge vulnerability paves the way for another data breachLet's face it—application vulnerabilities have become inevitable in recent years. When...
Identity and access management | August 9, 2018Provisioning users in an Office 365 environmentSeparately provisioning users in Active Directory (AD) and Office 365 is repetitive and...
General | August 9, 2018Lessons from one of the first major data breaches in a post-GDPR EuropeAs the buzz around the GDPR and its implementation begins to settle down, we're starting...
Patch Manager Plus | August 8, 2018SingHealth cyberattack highlights importance of endpoint hardeningOne of the most important aspects of healthcare reform is an emphasis on preventative care...
Applications Manager | August 7, 2018Learn how to make the most out of your cloud and on-premises appsIn the digital economy, business applications have played an integral part in the...