Endpoint Central | September 15, 2017Secure your endpoints: Locky ransomware launches massive email campaigns Just when organizations were starting to feel safe after WannaCry and Petya, security...
Exchange Reporter Plus | September 14, 2017Use a hybrid Exchange environment? Exchange Reporter Plus has got your back! Cloud technology is becoming important for most companies, sometimes with entire...
AlarmsOne | September 13, 2017Curb alert noise and stay on top of critical alerts Our criteria-based alerting system has already helped countless organizations filter out...
Endpoint Central | September 12, 2017Desktop management for macOS High Sierra Apple launched its current operating system macOS Sierra on September 20, 2016. Almost a...
General | September 8, 2017#Uncomplicate your IT with integrated ITOM software Technology is supposed to make our lives easier, but it often unintentionally makes life...
ADManager Plus | September 8, 2017Start streamlining GPO management with ADManager Plus Wise are the administrators who create Active Directory (AD) objects and apply GPOs to...
Identity and access management | September 7, 2017Ransomware basics: Part 3 Even as I write this, I get the feeling that this blog series is too basic, but with the...
Password Manager Pro | September 5, 2017Begin your GDPR journey with privileged access management The core of the GDPR is all about data protection; specifically, securing EU citizens'...
General | September 1, 2017Support your end users, not your software ITSM is in a period of rapid change, that much is for sure. But with so much changing, it...
Identity and access management | August 31, 2017Ransomware basics: Part 2 In our first installment, we discussed the importance of backing up your data. Without a...
RecoveryManager Plus | August 30, 20175 shortcomings of native Active Directory backup and recovery tools Microsoft's Active Directory (AD) is a key network service in many organizations; without...
EventLog Analyzer | August 28, 2017Getting to know the GDPR: The technical and organizational measures Before we jump into the third part of this GDPR blog series, let's take a moment to think...