• Topics
    • Advanced IT analytics
    • General
    • Unified service management
    • Identity and access management
    • IT operations management and observability
    • Security Information and Event Management
    • Unified endpoint management and security

Home / Tags:Enterprise security

Embracing a holistic approach to privileged access security [Expert-led webinar]

IT Security | July 9, 2020

Embracing a holistic approach to privileged access security [Expert-led webinar]

If there's one silver lining to the COVID-19 pandemic, it’s that the importance of IT...

IT security: Disrupting the cybersecurity kill chain by detecting domain reconnaissance 

IT Security | February 3, 2020

IT security: Disrupting the cybersecurity kill chain by detecting domain reconnaissance 

Cyberattacks are a growing threat, and organizations are investing time and money in...

Protect your mobile devices from the Android.banker.A2f8a malware

Mobile Device Manager Plus | February 2, 2018

Protect your mobile devices from the Android.banker.A2f8a malware

Quick Heal Security Labs, an IT security firm, recently reported new Android malware by...

Free e-book: Six best practices for escaping ransomware

Endpoint Central | October 13, 2017

Free e-book: Six best practices for escaping ransomware

Breaking news about cyber attacks has reached an all-time high recently, with ransomware...

Enhancing IT security with adaptive security architecture - part 1

IT Security | April 7, 2016

Enhancing IT security with adaptive security architecture - part 1

According to a recent report by Deloitte, the average cost of a data breach to a single...