Latest Posts

Avert cyberattacks against MFA using FBI-recommended countermeasures [Webinar]

MFA-Hacks-webinar2

With the rise of remote work, multi-factor authentication (MFA) has become more essential than ever. MFA can be used to protect authentications happening on different resources like workstations, VPNs, and enterprise applications. MFA effectively stops credential-based attacks, as it requires …

ADSelfService Plus 2 min read Read

Solve storage monitoring woes with OpManager

Data in your enterprise organization doubles almost every year, and data multiplication at this pace requires boosting your storage capacity. But when the magnitude of data size increases, latency or performance lags are inevitable.

You can outsource your storage infrastructure …

OpManager 3 min read Read

3 simple ways to drastically reduce Active Directory administration costs [E-book]

Any Active Directory (AD) administrator knows that managing AD using just native tools is a chore. To make matters worse, today’s IT environments are more diverse than ever. Increasing cloud adoption coupled with remote work has made identity and access …

ADManager Plus 1 min read Read

The Building Company: “Building” the future with OpManager

The Building Company: “Building” the future with OpManager
The Building Company serves the full spectrum of the construction industry including the residential, commercial, and industrial markets. The retail activities of the company are provided through 124 outlets throughout Southern Africa. Operations are located in major centers in South …

OpManager 2 min read Read

IT security under attack blog series: Instant domain persistence by registering a rogue domain controller

In this blog in the IT security under attack series, we will learn about an advanced Active Directory (AD) domain controller (DC) attack to obtain persistence in AD environments.

Dubbed DCShadow, this is a late-stage kill chain attack that …

Log360 3 min read Read

6 ways to use analytics to deliver an exceptional end-user experience: Part 2

Welcome to the second part of our three-part blog series on leveraging analytics to deliver an exceptional end-user experience. In the last part, we discussed two key points: how to gauge the effectiveness of your support forms using analytics, …

Analytics Plus 4 min read Read

Five worthy reads: The rise in credential stuffing attacks

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week we explore how credential stuffing attacks are evolving and why they pose a greater threat than meets the eye.

General 3 min read Read

Free for unlimited users: Password Expiration Notifier for Active Directory

Changing your password periodically is vital and helps prevent hackers from accessing your network resources and inflicting damage. If users fail to change their passwords when prompted for security reasons, they get locked out of their accounts, and a substantial …

ADSelfService Plus 2 min read Read

CISO’s guide to building an ironclad data loss prevention strategy [E-book]

“The Global Datasphere will grow from 45 Zettabytes (ZB) in 2019 to 175ZB by 2025.” – International Data Corporation (IDC)

As data proliferates, traditional data protection tools have fallen into the shadow of comprehensive data loss prevention (DLP) solutions that …

DataSecurity Plus 1 min read Read