Five worthy reads: How organisations can exploit the potential of enterprise IoT

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we address the steady adoption of IoT across enterprises.

The Internet of Things (IoT) is ultimately all about data, …

General 2 min read Read

How strong are your passwords?

If you’re in IT, you likely know that you should never use weak passwords to secure your business accounts. However, with the average business user using around 191 passwords, the battle was lost 100 passwords ago. Users cope with …

General 2 min read Read

Remote desktop connection software: The key to efficient IT management

Remote desktop connection software

Being in two places at once may be every multitasker’s fantasy, but for many IT pros, being in two places at once is just part of the job. Using a remote desktop connection software, IT administrators can be present in …

General 3 min read Read

Still troubled by weak passwords in your Windows environment? Join our webinar to learn about strengthening passwords

As an administrator, keeping your Active Directory (AD) environment secure falls on you! Relying on passwords only for authentication is asking for trouble, especially when users set weak passwords like Password@123. Administrators need a way to ensure users are who …

General 1 min read Read

Want secure access to Windows logons and multiple cloud apps? ADSelfService Plus is a two for one

Enterprise applications have become an integral part of a tech user’s life. Although the utility and user experience of these applications has been getting better, the risk of cyber attacks has also been on the rise. That’s why it’s important …

General 2 min read Read

ROI calculators for software: Common problems and our uncommon solution

Often, organizations use ROI calculators to determine the return on investment for using its software. However, the soft benefits—metrics that add value but can’t be measured—cannot be quantified through an ROI calculator, and including them will yield inaccurate results. Many …

General 2 min read Read

Thwart password spray attacks to secure employee access to cloud apps

Chances are you’ve heard of traditional credential-based attacks on Active Directory (AD) and cloud applications—brute force attacks, dictionary attacks, and keylogging, to name a few. There’s now another attack type you should familiarize yourself with: password spray attacks. In this …

General 2 min read Read

Five worthy reads: Augmented analytics paves the way

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we look at the rise of augmented analytics and how it tackles the ever growing need for intelligent, data-driven

General 3 min read Read

Become an eagle-eyed network admin using OpManager’s push notifications

The secret to exceptional network management is periodically identifying and diagnosing network problems. Putting your experts at the network operations center (NOC) all day watching for a device to go down isn’t the best use of your workforce’s time. There …

General 2 min read Read