Introducing the ITOM podcast: Listen and learn how to avoid remote work roadblocks in an IT environment

In administrating all technology and application requirements within an organization, IT operations management (ITOM) is pretty complex, and tends to send IT admins scrambling for...

General 1 min read Read

The LLMNR/NBT-NS strike

Link-Local Multicast Name Resolution (LLMNR) and NetBIOS Name Service (NBT-NS) are two protocols that are used to identify a host address on a network when...

Active Directory , ADAudit Plus , General 2 min read Read

Five worthy reads: Embracing Zero Trust during a pandemic

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. With the rising concern over cybersecurity...

General 3 min read Read

How to track down network faults, combat threats, and accelerate network performance to bolster your remote workforce [Webinar]

With remote work quickly becoming the new norm, the business landscape is facing an entirely new set of challenges. Organizations are scrambling to steer clear...

General 1 min read Read

Launching Desktop Central Cloud: Embrace UEM the SaaS way!

Desktop Central is a holistic unified endpoint management (UEM) solution that offers a dynamic approach to securing and managing user devices, including desktops, laptops, smartphones,...

General 1 min read Read

Leveraging IoT to target pain points in the healthcare industry

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. Most healthcare facilities already use the...

General 3 min read Read

SQL Server, Part 4: Understanding built-in SQL Server principals

In the previous blog in this series, we discussed the principle of least privilege, and the importance of assigning bare minimum privileges to users and systems at database...

General 3 min read Read

Five worthy reads: Privacy in pandemic management

Five worthy reads is a regular column on five noteworthy items we have discovered while researching trending and timeless topics. This week, we explore the...

General 2 min read Read

Your return-to-the-office cybersecurity checklist

The novel COVID-19 pandemic has changed the way organizations work. The sudden transition to remote work has forced organizations to look for temporary fixes to bridge...

General 4 min read Read