General | August 22, 2019There's more than one way to get admin privilegesActive Directory (AD) was introduced to the IT world in the mid-1990s, and it has come a long way since then, undergoing several stages of expansion....
Log360 | August 20, 2019Keeping up with compliance regulations like the GDPR and CCPA - Free webinarThe EU's GDPR and California's CCPA are two of the world’s most prominent data regulations. Similar laws have...
ADSelfService Plus | August 19, 2019Managing updates to local cached credentials for remote users in a hybrid Active Directory environmentAmong the many issues remote users face, forgotten passwords can be a significant roadblock to productivity,...
General | August 14, 2019Microsoft Patch Tuesday August 2019: WannaCry-level “wormable” flaws patchedNo matter how prepared you are, Patch Tuesday never fails to throw in a surprise. With the Microsoft Security...
Identity and access management | August 13, 2019Active Directory authentication protocols and security risksFor organizations to maintain security and reduce their threat exposure, it's critical to...
Log360 | August 12, 2019Zooming in on UEBA: Answering the "what" and the "how" What is UEBA? User and entity behavior analytics (UEBA) is a relatively new category of...
ADSelfService Plus | August 9, 2019Azure AD Password Protection: The good, the bad, and the uglyPeople often use common words as their passwords so they don’t forget them. This practice...
ADAudit Plus | August 8, 2019Find out which of your employees pose the greatest security riskAmong the different types of cyberattacks, insider threats are the hardest to track and...
Mobile Device Manager Plus | August 6, 2019Seven ways to secure macOS deployments in your enterpriseOver the years, deployment of macOS devices in enterprises have grown exponentially in...
Security Information and Event Management | August 6, 2019Five events you should be alerted about in your network"What types of events in my network are indications of an attack?" This is a question many...