Applications Manager | August 29, 2018Tackling the top four challenges of Azure SQL Database monitoringWith large enterprises increasing their focus on public cloud providers, Microsoft Azure continues to have a strong foothold in the hybrid cloud...
Mobile Device Manager Plus | August 28, 2018Tinder hack targeting RAF's F-35 program emphasizes the need for mobile device managementWhile security professionals are busy protecting enterprises against DDoS attacks, ransomware, and...
IT Security | August 27, 2018Simplifying security auditing, Part 3: Keeping insider threats in check Insider threats are on the rise. In fact, both administrators and average employees are among the biggest...
Log360 | August 23, 2018Unravel security incidents using event correlation [Webinar]Event correlation helps you wrap your head around the countless number of events going on in your organization...
Identity and access management | August 23, 2018Monitoring service account password changes in Active DirectoryService accounts are dedicated Active Directory (AD) accounts that are used to manage...
Mobile Device Manager Plus | August 22, 2018Prevent Man-in-the-Disk attacks using the right mobile security proceduresOrganizations that offer employees the freedom of mobility gain some advantages, which...
General | August 21, 2018Effective password management techniques for Active Directory [free webinar]Passwords have formed an integral part of Microsoft Active Directory since its inception....
General | August 21, 2018Simplifying security auditing, Part 2: Auditing systems that store sensitive data In part 1, we looked at an overview of auditing servers. In this blog, we'll discuss which...
AlarmsOne | August 20, 2018Auto-remediate your IT incidents using scriptsIt's 2am. You receive a notification from your monitoring tool. A host server ran out of...
General | August 17, 2018Five worthy reads: The "edge" is near!Five worthy reads is a regular column on five noteworthy items we’ve discovered while...