General | March 28, 2018The GDPR: Correcting data security negligence from companies like Facebook, Swisscom and L'express Incident 1: Facebook, Cambridge Analytica data leak According to The New York Times,...
ADSelfService Plus | March 27, 2018How syncing passwords between Active Directory and Salesforce reduced one IT team's workload Every IT help desk is burdened with password-related requests, which are especially tough...
Key Manager Plus | March 21, 2018Migrating HTTP to HTTPS: A top priority in 2018 Starting July 2018 with the release of Chrome browser version 68, Google Chrome will start...
Key Manager Plus | March 20, 2018Expired SSL certificate shuts down Oculus headsets around the world Thousands upon thousands of affected Oculus Rifts was the last thing Oculus VR—a division...
General | March 19, 2018Password synchronization between Active Directory and Salesforce accounts As the number of Salesforce user accounts increases within your organization, managing...
General | March 16, 2018Five worthy reads: Kickstart your GDPR journey Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
IT Security | March 16, 2018GDPR prep steps—Part 1 The deadline for the General Data Protection Regulation (GDPR) is looming closer. Are you...
Mobile Device Manager Plus | March 15, 2018Got Chromebooks? Mobile Device Manager Plus now supports those too! Good news for all the enterprises that have jumped on the Chromebook bandwagon: we've...
General | March 15, 2018Why automation is the best thing for compliance reporting The main purpose of compliance auditing is to identify how well a company is following...
Endpoint Central | March 14, 2018IT service management's ever-changing landscape It's easy to see that the IT service management (ITSM) landscape is changing quickly. In...
Endpoint Central | March 14, 2018Microsoft Patch Tuesday March 2018 updates Compared to March 2017, this month's Patch Tuesday is rather tame. This time last year,...
EventLog Analyzer | March 13, 2018Talk to our experts about the essentials of log management Log management is a pillar of security information and event management (SIEM), and is...