Success Story: A Leading Bank in Netherlands Centrally Controls Privileged Access with Password Manager Pro

Against the ​backdrop of the ever-increasing cyber attacks, government and industry regulations prescribe stringent security measures for banking and financial institutions to safeguard customer data....

Password Manager Pro 1 min read Read

Combat Identity Thefts and Advanced Cyber Threats with Password Manager Pro Enterprise Edition

No one is safe out on the virtual streets of cyber world, and security breaches surface quite frequently to remind us of the same. Lately, the...

Password Manager Pro 3 min read Read

Microsoft LAPS:  Honest Obituary or False Eulogy to the Death of Passwords?

The famous Latin phrase De mortuis nil nisi bonum (Of the dead, nothing unless good) came to mind last week when Microsoft announced the release of LAPS (Local Administrator Password...

Password Manager Pro 3 min read Read

How Secure Is Password Manager Pro?

Gone are the days when all you needed was a strong password to guard your data. Now, we live in an era where you not...

Password Manager Pro 5 min read Read

Hacking Hospitality: How to Fight the Cyber-criminals Targeting Business Travelers

Traditionally, financial institutions have remained the top targets of cyber-criminals across the globe. Of late, hackers are eyeing so many other things that, one would normally...

Password Manager Pro 3 min read Read

Protective, GPG13-Compliant Monitoring Using EventLog Analyzer

​The journey to a thousand IT problems begins with a single compliance lapse. Yes, this is the first time you are hearing it! So, tell...

EventLogAnalyzer 3 min read Read

​​Jimmy Kimmel Sheds Light on Password Security

Ace comedian Jimmy Kimmel, who is known for tickling our funny bones through his television shows, tried a social engineering experiment last week. In the...

Password Manager Pro 2 min read Read

Solving a Cyber Crime Case Like Sherlock Holmes

IT security managers lay a lot of emphasis on conducting log forensics investigations. According to the SANS 2013 Digital Forensics Survey, 57% of the respondents...

EventLogAnalyzer 3 min read Read

8 Log Management Habits of Highly Effective IT Security Managers

In today’s business environment, data is the source that drives organizations in the proper direction. Data enables planning, forecasting, and strategy. For example, retailers rely...

EventLogAnalyzer 5 min read Read