Identity and access management | December 28, 2017Preparing for the GDPR: Designing Active Directory groupsOne aspect of the GDPR is the fact that all users who have access to personal data must be monitored. As a best practice, only groups should be placed...
Endpoint Central | December 22, 2017Keeper leaves Windows 10 systems vulnerable to password theftMicrosoft just recently rolled out Patch Tuesday updates for December 2017, but there's already another...
Identity and access management | December 14, 2017GDPR preparation—Testing GDPR compliance auditing will be new to many organizations that have never been under a compliance regulation...
Unified endpoint management and security | December 13, 2017Meet a Major Player of the EMM and UEM industriesWe're thrilled to share that market research firm International Data Corporation (IDC) has recognized Zoho's...
Patch Manager Plus | December 13, 2017Microsoft Patch Tuesday December 2017 updatesMicrosoft Patch Tuesday December 2017 has finally arrived, with a list of 34 critical...
Endpoint Central | December 13, 2017Prevent remote code execution by disabling Microsoft's Equation Editor nowWhile many of us are looking forward to some well-earned time off, cyber attacks aren't...
Patch Manager Plus | December 12, 2017TeamViewer hacked: Here's how to protect your systemsAfter reports of a serious bug, the developer behind TeamViewer, the popular remote...
AlarmsOne | December 8, 2017Create flexible alerts with AlarmsOne's all-new Alarm ModifierIn our never-ending quest to find ways to curb alert noise, we've come up with some...
Identity and access management | December 7, 2017Common mistakes administrators make when applying GPOs – Part 1Active Directory (AD) and Group Policy (GP) are essential components of most enterprises,...
Endpoint Central | December 6, 20175 building blocks for seamless endpoint securityEnterprise security has become a top priority with the recent spike in cyber attacks....