General | August 3, 2019Five worthy reads: Threat intelligence—the key to proactive cybersecurity Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
ServiceDesk Plus | August 2, 2019ServiceDesk Plus named in Capterra's 20 most popular IT asset management solutions list ServiceDesk Plus’ latest recognition comes from Gartner’s Capterra, which has awarded...
Log360 | August 1, 2019Dealing with three pathbreaking scenarios under the CCPA The "right to be forgotten" is one of the new rights consumers will have under the CCPA. ...
ADManager Plus | July 31, 2019How to create bulk users in Active Directory using a CSV file Dear admin, Please create Active Directory user accounts, cloud app accounts, home folders...
ADSelfService Plus | July 30, 20192FA based on OU/group membership in hybrid Active Directory In a previous blog, we saw how two-factor authentication (2FA) secures access to cloud...
ADSelfService Plus | July 25, 2019Three critical password management blunders that hackers regularly exploit and best practices to replace them IT teams often shoulder a number of important security-related responsibilities. It's...
Log360 | July 22, 2019Five reasons to choose Log360, part 5: Integrated compliance management So far in this blog series, we've seen how Log360 is simple to get up and running, allows...
OS Deployer | July 20, 2019What is Windows 10 migration, and how do you implement Windows 7 to Windows 10 migration? Windows 7 to Windows 10 migration Microsoft has announced end of life (EOL) for Windows 7...
General | July 19, 2019Five worthy reads: Is your enterprise dealing with data sprawl properly? Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
OpManager | July 17, 2019OpManager bags gold—listed in Feedspot's top networking blogs and sites to follow in 2019 Great news! The OpManager blog has ranked #15 in Feedspot's top 100 networking blogs and...
ADAudit Plus | July 17, 2019Detecting first time processes on member servers to protect against attacks In a previous blog, we saw how ADAudit Plus’ user behavior analytics (UBA) capabilities...
ADSelfService Plus | July 16, 2019Complying with NIST password guidelines Passwords are the most widely used form of authentication across the globe and serve as...