Patch Manager Plus | August 10, 2018Microsoft Edge vulnerability paves the way for another data breachLet's face it—application vulnerabilities have become inevitable in recent years. When Microsoft released Edge, its web browser created to replace...
Identity and access management | August 9, 2018Provisioning users in an Office 365 environmentSeparately provisioning users in Active Directory (AD) and Office 365 is repetitive and inefficient. Other...
General | August 9, 2018Lessons from one of the first major data breaches in a post-GDPR EuropeAs the buzz around the GDPR and its implementation begins to settle down, we're starting to see how this...
Patch Manager Plus | August 8, 2018SingHealth cyberattack highlights importance of endpoint hardeningOne of the most important aspects of healthcare reform is an emphasis on preventative care, which makes the...
Applications Manager | August 7, 2018Learn how to make the most out of your cloud and on-premises appsIn the digital economy, business applications have played an integral part in the...
General | August 3, 2018Five worthy reads: The rising significance of privileged identity managementFive worthy reads is a regular column on five noteworthy items we’ve discovered while...
OpManager | August 3, 2018Integrate OpManager with AlarmsOne and manage your alerts like a proOpManager helps enterprises monitor their network, devices, servers, firewall, and more....
Identity and access management | August 2, 2018Securing zone levels in Internet ExplorerManaging and configuring Internet Explorer can be complicated. This is especially true...
Endpoint Central | August 1, 2018Linux security and patching: Are you as safe as you think you are? A common question posed by enterprises when it comes to defending against...
General | August 1, 2018[Free guide] Common password attacks and effective countermeasuresTechnology has changed over the years, but one constant remains—the username-password...