Patch Manager Plus | December 18, 2018Preventing the SQLite Magellan vulnerability from damaging your applications Emerging vulnerabilities and continuous patching have been at odds with each other ever...
Applications Manager | December 17, 2018AWS monitoring 101: Metrics to watch out for Amazon Web Services (AWS) is one of the most popular public cloud providers today. Over...
M365 Manager Plus | December 14, 2018Import or export your mailboxes to PST files with this free tool Minimal investment on infrastructure and the promise of less maintenance are luring many...
Applications Manager | December 13, 2018Applications Manager: A game changer for multiple businesses To retain a competitive advantage in today's fast-paced digital market, organizations...
Key Manager Plus | December 12, 2018One expired security certificate leaves millions of smartphones offline Yes, you read the headline right. And no, this outage isn’t the first of its kind....
Endpoint Central | December 12, 2018Microsoft Patch Tuesday updates for December 2018 Another month and another Patch Tuesday update from Microsoft. But this month, the buzz...
ServiceDesk Plus | December 10, 2018Integrating Siri shortcuts with ServiceDesk Plus Cloud’s iOS app Performing actions in ServiceDesk Plus Cloud’s iOS app using just your voice is now...
Analytics Plus | December 7, 2018Advanced analytics for ServiceDesk Plus' ticket history, projects, and knowledge base modules We're happy to announce the release of advanced analytics for three more ServiceDesk Plus...
Identity and access management | December 6, 2018Leveraging logic and AI to detect malicious behavior in Active Directory [Webinar] Active Directory is still vital for every organization that's staying on-premises or...
OpUtils | December 5, 2018Tackling IP address management challenges using OpUtils If you’re a network administrator, then you probably already know that complex...
General | December 4, 20185 ways to ensure business continuity in the wake of network disasters Many businesses today are built around their network infrastructure, which often requires...
Log360 | December 3, 2018Conquer it with correlation—Part 2: The data breach In my previous post, we looked at how event correlation can be used to deal with advanced...