Our product development team has been focusing on correlation and threat intelligence features, with the goal of thwarting external breach attempts. This year, we built new capabilities,...
ADSolutions’ year in review, Part 4: ADAudit Plus
Following the Cambridge Analytica scandal, IT security has catapulted to the headlines in 2018. With every organization striving to secure their IT infrastructure better than ever...
ADSolutions’ year in review, Part 3: ADSelfSevice Plus
Just like our other ADSolutions products, ADSelfService Plus—our secure, end-user password reset management and single sign-on solution—had a feature-packed 2018. With ADSelfService Plus, you don’t have to compromise...
ADSolutions’ year in review, Part 2: O365 Manager Plus
Office 365’s native tool has its share of limitations that pose various challenges to organizations adopting Office 365. For instance, the Security and Compliance Center retains...
5 ways to ensure business continuity in the wake of network disasters
Many businesses today are built around their network infrastructure, which often requires frequent modifications. But these frequent changes can turn out to be the weakest link in their infrastructure. Any of these changes have the potential to cause network...
[Free Webinar] Send weak passwords packing with a password policy enforcer
With the number of applications employees use increasing rapidly, it can be relatively easy for end users to fall into the habit of using passwords like Password@123. Even...
Five cybersecurity best practices to follow in 2019
Research by Cybersecurity Ventures predicts ransomware alone will cost businesses around the world more than $11.5 billion in 2019. What’s worse, this same study also predicts businesses will...
Chicago hosts our biggest stateside User Conference yet
Two-hundred and seventy customers braved the cold this October to attend our Chicago User Conference. Quite a few were new customers, and some hadn’t even...