Securing zone levels in Internet Explorer

Managing and configuring Internet Explorer can be complicated. This is especially true when users meddle with the numerous settings it houses. Users may even unknowingly enable the execution of malicious codes. This highlights the importance of securing Internet Explorer.

In …

Active Directory 3 min read Read

Webinar: Streamline incident management using SIEM

Organizations deal with several security incidents on a daily basis. Establishing accountability in resolving these incidents is a tough job. From detecting incidents to resolving them, you need a proper incident management system that will not only ensure accountability but …

Log360 1 min read Read

Securing and protecting Active Directory and Windows networks webinar series

Recent attacks have proven that additional work needs to be done to secure our Windows environments. Active Directory, servers, users, privileges, vulnerabilities, etc. need to be configured correctly and monitored for changes. The issue that most organizations have with securing …

Active Directory 1 min read Read

Contest alert: Take part in the Log360 product pro challenge

We are delighted to announce our “Log360 product pro” challenge, a unique community contest. To participate, all you have to do is answer three simple questions over on our forum, and you could win a $25 Amazon gift card.

Over …

Log360 1 min read Read

Free webinar: Learn how to protect your enterprise from ransomware 

What’s the first thing that comes to mind when you think about ransomware defense? Patching? Regular backups? Patching is a must if you want to ensure your systems are running the latest software, while taking backups of your sensitive data …

DataSecurity Plus 1 min read Read

Free webinar: Tracking Active Directory attacks and user logons

Microsoft Active Directory is the center of most enterprises’ network identity management. Being able to track how Active Directory user accounts are accessed and used is a key aspect of securing access to network resources. As an administrator, you need …

Active Directory 1 min read Read

Selecting an IAM solution that fits your enterprise

When it comes to managing the identity and access of users, Active Directory leaves a few gaps. These gaps can impact everything from user productivity to corporate security. This is where third-party identity and access management (IAM) tools come into …

Active Directory 2 min read Read

Why password complexity is so important for your organization

Passwords are a big part of your Active Directory (AD) environment. As an administrator, you have to enforce strict password policies to ensure better security for your AD environment, but these policies are often difficult for users to adhere to. …

Active Directory 2 min read Read

A spot-on single sign-on solution

Businesses adopt a swarm of applications like G Suite, Office 365, and Salesforce to help employees work more efficiently. This may not always fare well for end users, especially when the number of adopted applications is high and users have …

ADSelfService Plus 2 min read Read