We have seen, heard and experienced various kinds of mobile devices; mobile phones, tablets, the old palmtops and any others you can think of. It’s...
Triple Recognition for Password Manager Pro this year! World’s Mightiest Enterprises Repose Trust!
The IT divisions of three of world’s largest organizations – software maker, retail chain and virtualization platform provider have deployed Password Manager Pro to manage...
Password Reuse, Insider Threats – The Most Dangerous IT Security Issues in 2012!
Deploying a password management solution would indeed be the best start towards information security this festive season! 2012 is fast drawing to a close. While...
Password Reuse, Insider Threats – The Most Dangerous IT Security Issues in 2012!
Deploying a password management solution would indeed be the best start towards information security this festive season! 2012 is fast drawing to a close. While...
Can your organization be Hack Immune?
This past few months witnessed a record breaking global level of malware threats and APTs (Advanced Persistent Threat) that put the mightiest of Enterprises’ security...
Cyber Monday Lessons: Apple Can Get Away with Outdated Mobile Sites…But You Can’t
Yesterday, I connected to Apple’s website on my iPhone, only to discover that the undisputed leader of all things mobile didn’t have a mobile-friendly website. Well to be...
Monitoring Privileged Activities, a Crucial Aspect of Data Center Infrastructure Management
Data centers represent the nerve center of IT enterprises. With the presence of a complex mix of databases, network devices, applications and physical and virtual systems,...
Points worth pondering – BYOD
With the increased adoption of Tablets and smart phones, employees are willing to use their devices to access the corporate resources. Enterprise irrespective of small,...
Change Control Automation & Better Management of Network Assets
In IT infrastructure management, integration of tools/software with one another has always been a crucial requirement. In Network Change and Configuration Management (NCCM), which predominantly...