Identity and access management | November 29, 2018Monitoring Active Directory and Windows computers to detect attacks [Webinar] If organizations and administrators can be alerted when they're under attack, then they...
Patch Manager Plus | November 28, 2018SUSE Linux: Patching the world's first enterprise distribution of Linux SUSE Linux patching For all you car fans out there, Tesla is all set to release its...
Log360 | November 26, 2018Conquer it with correlation—Part 1: The advanced persistent threat (APT) Among all the pesky attacks that keep security administrators working late, advanced...
Applications Manager | November 24, 2018Join Applications Manager at AWS re:Invent 2018 Get ready for the most happening event of the year! AWS' flagship event AWS re:Invent is...
Browser Security Plus | November 23, 2018Secure your browser against these 5 threats With organizations actively adopting cloud computing, browsers have become an...
Firewall Analyzer | November 22, 2018Firewall Analyzer enhancements that fire up your firewall devices The Firewall Analyzer team is constantly working on enhancements to improve its product...
Unified service management | November 21, 2018Better functional invoices, new integrations, and more introduced in ServiceDesk Plus MSP 9410 Your trusted MSP service desk software just got a whole lot better with a set of new...
General | November 19, 2018[Free Webinar] Send weak passwords packing with a password policy enforcer With the number of applications employees use increasing rapidly, it can be relatively...
ADAudit Plus | November 16, 2018Account lockout and management tools Sometimes, when you get a call regarding a password reset, you can already guess who it...
Applications Manager | November 16, 2018Top metrics to consider while monitoring DynamoDB performance NoSQL databases have always been regarded as a notch above SQL databases. The primary...
Identity and access management | November 15, 2018User behavior analytics for streamlined threat detection Cyberthreats are on the rise and breaches are becoming more common. Many businesses rely...
General | November 15, 2018Tighten security against cyberthreats with multi-factor authentication Protecting enterprise data from cyberthreats is a constant and tiring affair. It's usually...