Latest Posts

Tighten security against cyberthreats with multi-factor authentication

Protecting enterprise data from cyberthreats is a constant and tiring affair. It’s usually weak, default, or stolen credentials that pave the way for data breaches. According to Verizon’s 2018 Data Breach Investigations Report, 81 percent of breaches were due …

General 1 min read

Microsoft Patch Tuesday update November 2018

Microsoft just announced its Patch Tuesday updates for November, and this month’s list of patches comes with fixes for 64 vulnerabilities, 12 of which are rated critical. It also has patches for the ALPC elevation of privilege vulnerability, along …

Desktop Central 2 min read

Five cybersecurity best practices to follow in 2019

Research by Cybersecurity Ventures predicts ransomware alone will cost businesses around the world more than $11.5 billion in 2019. What’s worse, this same study also predicts businesses will experience a cyberattack every 14 seconds by 2019, up from once every …

General 2 min read

Chicago hosts our biggest stateside User Conference yet

Two-hundred and seventy customers braved the cold this October to attend our Chicago User Conference. Quite a few were new customers, and some hadn’t even deployed the products yet but were trying to get a head start before purchasing a …

General 2 min read

Five worthy reads: Is your cybersecurity strategy proactive, reactive, or both?

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we cover the important factors and thoughts that go into building a blend of proactive and reactive cybersecurity strategy.

General 3 min read

Deploying OSs to remote offices just got easier

From startups to enterprises, organizations around the world are expanding their business by opening new branch offices. The first thing many organizations do after opening a branch office is purchase computers for their new employees, which means deploying an operating …

General 2 min read

A beginner’s seminar to everything ITOM: IT Operations Management, New York and Orlando, 2018


The IT Operations Management 2018 Seminar is heading to New York and Orlando! After completing successful seminars in Australia, United Arab Emirates, Saudi Arabia, Italy, Mexico, Chile, Singapore, Malaysia, Indonesia, and Philippines, we’re making our way to the United States. …

OpManager 1 min read

Synchronize Active Directory and SAP NetWeaver passwords to simplify password management

Today’s employees are often overwhelmed with the number of passwords they have to manage on a regular basis. This leads to increased help desk calls due to forgotten passwords, a rise in IT expenses, and reduced user productivity.

If you’re …

General 2 min read

Apple’s latest OS updates help strengthen device and data security

Apple recently released OS updates for iPhones, Macs, and Apple TVs. With these releases, Apple’s main focus has been on improving data security and providing device management solutions greater control over managed devices. Let’s take a closer look at the …

Mobile Device Manager Plus 2 min read

Shine light on your applications’ performance with our free training series

One of the greatest challenges of monitoring applications is the lack of holistic, actionable insights for key application components. For example, assume you own an e-commerce website. To power it all, you rely on both a hybrid cloud infrastructure to …

Applications Manager 1 min read