General | December 4, 20185 ways to ensure business continuity in the wake of network disastersMany businesses today are built around their network infrastructure, which often requires frequent modifications. But these frequent changes can turn...
Log360 | December 3, 2018Conquer it with correlation—Part 2: The data breachIn my previous post, we looked at how event correlation can be used to deal with advanced persistent threats ...
Identity and access management | November 29, 2018Monitoring Active Directory and Windows computers to detect attacks [Webinar]If organizations and administrators can be alerted when they're under attack, then they can take immediate...
Patch Manager Plus | November 28, 2018SUSE Linux: Patching the world's first enterprise distribution of Linux SUSE Linux patching For all you car fans out there, Tesla is all set to release its fastest full-electric...
Log360 | November 26, 2018Conquer it with correlation—Part 1: The advanced persistent threat (APT)Among all the pesky attacks that keep security administrators working late, advanced...
Applications Manager | November 24, 2018Join Applications Manager at AWS re:Invent 2018Get ready for the most happening event of the year! AWS' flagship event AWS re:Invent is...
Browser Security Plus | November 23, 2018Secure your browser against these 5 threatsWith organizations actively adopting cloud computing, browsers have become an...
Firewall Analyzer | November 22, 2018Firewall Analyzer enhancements that fire up your firewall devicesThe Firewall Analyzer team is constantly working on enhancements to improve its product...
Unified service management | November 21, 2018Better functional invoices, new integrations, and more introduced in ServiceDesk Plus MSP 9410Your trusted MSP service desk software just got a whole lot better with a set of new...
General | November 19, 2018[Free Webinar] Send weak passwords packing with a password policy enforcerWith the number of applications employees use increasing rapidly, it can be relatively...