Ransomware basics: Part 1

There are many articles on ransomware. Many are trying to convince you that if you buy the products they mention, you can prevent ransomware attacks....

Active Directory 2 min read Read

Office 365 help desk delegation with O365 Manager Plus

While Office 365 lets you work from anywhere around the globe, the management features it provides are often insufficient. When an organization is spread across multiple...

O365 Manager Plus 2 min read Read

5 crucial facts that you must know about identity and access management

IAM is IT-centric. Identity and access management (IAM) may appear easy to some, but in reality, it is very tricky. Proper IAM is the key to...

AD360 4 min read Read

Single sign-on (SSO) for the cloud

Nearly every organization has some cloud-based application. Of course the common cloud apps include Microsoft Azure, Office 365, G Suite, those from Zoho and Salesforce,...

ADSelfService Plus 1 min read Read

5 things to keep in mind before backing up your VMware virtual machines

The architecture of a virtual machine differs vastly from traditional on-premises environments, and requires different data backup techniques and pre-backup operations. This post will explain some of the...

RecoveryManager Plus 2 min read Read

Best practices for Active Directory backup and recovery

It’s easy to make Active Directory (AD) administrators uncomfortable. Just ask them about their disaster recovery plan. When faced with this question, most AD administrators will only tell you about their object recovery plan. Only...

RecoveryManager Plus 2 min read Read

Approval workflow: Supervise self-service in Active Directory

Are you comfortable giving end users the power to update their own information in Active Directory? Definitely not! Are you willing to take on the responsibility of updating user information and managing users’ passwords? Not only is this a daunting task,...

Active Directory 1 min read Read

The case for incident management in a SIEM system

Log360‘s latest incident management system is the perfect bridge between your incident detection and response processes. The feature comes in handy for security administrators and the various agents who...

Log360 2 min read Read