Log360 | November 26, 2018Conquer it with correlation—Part 1: The advanced persistent threat (APT)Among all the pesky attacks that keep security administrators working late, advanced persistent threats (APTs) are possibly the most lethal. An APT is...
Applications Manager | November 24, 2018Join Applications Manager at AWS re:Invent 2018Get ready for the most happening event of the year! AWS' flagship event AWS re:Invent is all set to take...
Browser Security Plus | November 23, 2018Secure your browser against these 5 threatsWith organizations actively adopting cloud computing, browsers have become an indispensable part of every end...
Firewall Analyzer | November 22, 2018Firewall Analyzer enhancements that fire up your firewall devicesThe Firewall Analyzer team is constantly working on enhancements to improve its product offering. Here's an...
Unified service management | November 21, 2018Better functional invoices, new integrations, and more introduced in ServiceDesk Plus MSP 9410Your trusted MSP service desk software just got a whole lot better with a set of new...
General | November 19, 2018[Free Webinar] Send weak passwords packing with a password policy enforcerWith the number of applications employees use increasing rapidly, it can be relatively...
ADAudit Plus | November 16, 2018Account lockout and management toolsSometimes, when you get a call regarding a password reset, you can already guess who it...
Applications Manager | November 16, 2018Top metrics to consider while monitoring DynamoDB performanceNoSQL databases have always been regarded as a notch above SQL databases. The primary...
Identity and access management | November 15, 2018User behavior analytics for streamlined threat detectionCyberthreats are on the rise and breaches are becoming more common. Many businesses rely...
General | November 15, 2018Tighten security against cyberthreats with multi-factor authenticationProtecting enterprise data from cyberthreats is a constant and tiring affair. It's usually...