ADSolutions’ year in review, Part 5: EventLog Analyzer

Our product development team has been focusing on correlation and threat intelligence features, with the goal of thwarting external breach attempts. This year, we built new capabilities, strengthened existing features, and enhanced the usability of the product. 

Here are five …

General 1 min read

ADSolutions’ year in review, Part 4: ADAudit Plus

Following the Cambridge Analytica scandal, IT security has catapulted to the headlines in 2018. With every organization striving to secure their IT infrastructure better than ever before, ADAudit Plus has come up with just the right features this year to …

General 1 min read

ADSolutions’ year in review, Part 3: ADSelfSevice Plus

Just like our other ADSolutions products, ADSelfService Plus—our secure, end-user password reset management and single sign-on solution—had a feature-packed 2018. With ADSelfService Plus, you don’t have to compromise on Windows logon security, use only a few logon methods, or depend …

General 1 min read

ADSolutions’ year in review, Part 2: O365 Manager Plus

Office 365’s native tool has its share of limitations that pose various challenges to organizations adopting Office 365. For instance, the Security and Compliance Center retains audit logs only for 90 days, after which they’re purged. Another limitation is the …

General 1 min read

5 ways to ensure business continuity in the wake of network disasters

Many businesses today are built around their network infrastructure, which often requires frequent modifications. But these frequent changes can turn out to be the weakest link in their infrastructure. Any of these changes have the potential to cause network disasters …

General 1 min read

[Free Webinar] Send weak passwords packing with a password policy enforcer

With the number of applications employees use increasing rapidly, it can be relatively easy for end users to fall into the habit of using passwords like Password@123. Even though this password satisfies all the requirements of a strict password …

General 2 min read

Tighten security against cyberthreats with multi-factor authentication

Protecting enterprise data from cyberthreats is a constant and tiring affair. It’s usually weak, default, or stolen credentials that pave the way for data breaches. According to Verizon’s 2018 Data Breach Investigations Report, 81 percent of breaches were due …

General 1 min read

Five cybersecurity best practices to follow in 2019

Research by Cybersecurity Ventures predicts ransomware alone will cost businesses around the world more than $11.5 billion in 2019. What’s worse, this same study also predicts businesses will experience a cyberattack every 14 seconds by 2019, up from once every …

General 2 min read

Chicago hosts our biggest stateside User Conference yet

Two-hundred and seventy customers braved the cold this October to attend our Chicago User Conference. Quite a few were new customers, and some hadn’t even deployed the products yet but were trying to get a head start before purchasing a …

General 2 min read

Five worthy reads: Is your cybersecurity strategy proactive, reactive, or both?

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we cover the important factors and thoughts that go into building a blend of proactive and reactive cybersecurity strategy.

General 3 min read