Separately provisioning users in Active Directory (AD) and Office 365 is repetitive and inefficient. Other than complex PowerShell scripting, Microsoft doesn’t provide options for provisioning...
Securing zone levels in Internet Explorer
Managing and configuring Internet Explorer can be complicated. This is especially true when users meddle with the numerous settings it houses. Users may even unknowingly...
Webinar: Streamline incident management using SIEM
Organizations deal with several security incidents on a daily basis. Establishing accountability in resolving these incidents is a tough job. From detecting incidents to resolving them,...
Securing and protecting Active Directory and Windows networks webinar series
Recent attacks have proven that additional work needs to be done to secure our Windows environments. Active Directory, servers, users, privileges, vulnerabilities, etc. need to...
Self-service password reset to the rescue
Every organization has its own password complexity requirements needed to ensure optimum security. Password complexity requirements force users to create strong, complex passwords that are...
Contest alert: Take part in the Log360 product pro challenge
We are delighted to announce our “Log360 product pro” challenge, a unique community contest. To participate, all you have to do is answer three simple questions over...
Free webinar: Learn how to protect your enterprise from ransomware
What’s the first thing that comes to mind when you think about ransomware defense? Patching? Regular backups? Patching is a must if you want to ensure your systems...
Free webinar: Tracking Active Directory attacks and user logons
Microsoft Active Directory is the center of most enterprises’ network identity management. Being able to track how Active Directory user accounts are accessed and used...
Selecting an IAM solution that fits your enterprise
When it comes to managing the identity and access of users, Active Directory leaves a few gaps. These gaps can impact everything from user productivity...