• Topics
    • Advanced IT analytics
    • General
    • Identity and access management
    • IT operations management and observability
    • Unified service management
    • Unified endpoint management and security
    • Security Information and Event Management

Home / Blog

Why litigation holds are not a viable alternative to backups

RecoveryManager Plus | July 5, 2019

Why litigation holds are not a viable alternative to backups

Microsoft does not provide backup and recovery tools for its Office 365 services and has...

Monitoring user logon activity to identify compromised accounts

ADAudit Plus | July 4, 2019

Monitoring user logon activity to identify compromised accounts

In a previous blog, we saw how ADAudit Plus' user behavior analytics (UBA) capabilities...

Unmask malicious insiders with user behavior analytics

ADAudit Plus | June 28, 2019

Unmask malicious insiders with user behavior analytics

Insider threats are both the most successful way to exfiltrate sensitive business data...

Bringing SSO to hybrid Active Directory

ADSelfService Plus | June 27, 2019

Bringing SSO to hybrid Active Directory

As enterprises transition to a hybrid Active Directory (AD) environment, it’s important...

[Infographic] Top three approaches to dealing with account lockouts

Identity and access management | June 10, 2019

[Infographic] Top three approaches to dealing with account lockouts

In the previous blog of this series, "[Infographic]Three tips to simplify Active Directory...

[Infographic]Three tips to simplify Active Directory compliance and auditing

ADAudit Plus | June 6, 2019

[Infographic]Three tips to simplify Active Directory compliance and auditing

In the previous blog of this series, "[Infographic] Still manually onboarding users into...

Detecting changes in privileged accounts in Azure AD

Identity and access management | May 23, 2019

Detecting changes in privileged accounts in Azure AD

Monitoring and protecting privileged accounts is paramount because failure to do so can...

[Infographic] Top three password-related issues that plague IT admins

ADSelfService Plus | May 21, 2019

[Infographic] Top three password-related issues that plague IT admins

Managing user identities is an everyday affair for an IT administrator. However, in large...

Two-factor authentication for secure access to cloud apps in hybrid AD

ADSelfService Plus | May 17, 2019

Two-factor authentication for secure access to cloud apps in hybrid AD

In an earlier post, we dealt with the benefits of single sign-on (SSO) for cloud apps in...

Firefox add-on outage: Yet another reminder for companies to enforce PKI life cycle automation

Key Manager Plus | May 16, 2019

Firefox add-on outage: Yet another reminder for companies to enforce PKI life cycle automation

More often than we'd like to admit, we tend to underestimate the impact of every moving...

Empower users to securely reset passwords from the login screen of their machines

ADSelfService Plus | May 16, 2019

Empower users to securely reset passwords from the login screen of their machines

With so many rapid technological advances, today's employees break all the usual work...

Simplify management and reporting of share and NTFS permissions

ADManager Plus | May 10, 2019

Simplify management and reporting of share and NTFS permissions

File servers are an essential component of every organization's IT infrastructure. Any...

Page 16 of 49« First«...1415161718...»Last »