General | March 19, 2018Password synchronization between Active Directory and Salesforce accountsAs the number of Salesforce user accounts increases within your organization, managing those accounts becomes a challenge. This adds mundane password...
General | March 16, 2018Five worthy reads: Kickstart your GDPR journeyFive worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and...
IT Security | March 16, 2018GDPR prep steps—Part 1The deadline for the General Data Protection Regulation (GDPR) is looming closer. Are you ready? In this two...
Mobile Device Manager Plus | March 15, 2018Got Chromebooks? Mobile Device Manager Plus now supports those too!Good news for all the enterprises that have jumped on the Chromebook bandwagon: we've expanded our endpoint...
General | March 15, 2018Why automation is the best thing for compliance reportingThe main purpose of compliance auditing is to identify how well a company is following...
Endpoint Central | March 14, 2018IT service management's ever-changing landscapeIt's easy to see that the IT service management (ITSM) landscape is changing quickly. In...
Endpoint Central | March 14, 2018Microsoft Patch Tuesday March 2018 updates Compared to March 2017, this month's Patch Tuesday is rather tame. This time last year,...
EventLog Analyzer | March 13, 2018Talk to our experts about the essentials of log managementLog management is a pillar of security information and event management (SIEM), and is...
AlarmsOne | March 9, 2018AlarmsOne introduces two-way tracking of alarms and ticketsAlarmsOne already has built-in integrations with SaaS-based help desk tools such as...
Identity and access management | March 8, 2018Tracking Group Policy changes: Why you should look beyond native auditingGroup Policy is undoubtedly one of the most powerful features of Active Directory. It...