Part two and part three of this blog series gave a detailed look at Log360’s in-depth auditing capabilities, while part one explained how easy the...
Search results for: GDPR
Prevent downtime in your organization with Mobile Device Manager Plus
It goes without saying that downtime is bad for organizations—not only does it put business-critical data at risk and hamper employee productivity, but it also...
[Infographic]Three tips to simplify Active Directory compliance and auditing
In the previous blog of this series, “[Infographic] Still manually onboarding users into Active Directory? There’s a better way!“, we discussed the tips and tricks to...
[Infographic] Top three password-related issues that plague IT admins
Managing user identities is an everyday affair for an IT administrator. However, in large organizations with complex IT hierarchies, things spiral out of control very quickly. Below...
Five worthy reads: Smart Spaces—for smart work or smart theft?
Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we’ll talk about Smart...
TI en 2018: Una retrospectiva de ManageEngine
El 2018 está llegando a su fin y es posible que ya esté recordando cómo ha sido este año para usted. En el mundo de...
IT in 2018: A ManageEngine retrospective
2018 is coming to an end and you might already be looking back at how this year has been for you. In the IT world, 2018 started with the...
ADSolutions’ year in review, Part 5: EventLog Analyzer
Our product development team has been focusing on correlation and threat intelligence features, with the goal of thwarting external breach attempts. This year, we built new capabilities,...
ADSolutions’ year in review, Part 4: ADAudit Plus
Following the Cambridge Analytica scandal, IT security has catapulted to the headlines in 2018. With every organization striving to secure their IT infrastructure better than ever...