RecoveryManager Plus | July 5, 2019Why litigation holds are not a viable alternative to backups Microsoft does not provide backup and recovery tools for its Office 365 services and has...
ADAudit Plus | July 4, 2019Monitoring user logon activity to identify compromised accounts In a previous blog, we saw how ADAudit Plus' user behavior analytics (UBA) capabilities...
Log360 | July 1, 2019Five reasons to choose Log360, part 2: Multi-environment support In the previous post of this series, we looked at how easy it is to get Log360 up and...
General | June 28, 2019Top three reasons passwords are here to stay as the primary form of authentication Yahoo and cell phone companies like Samsung wanted to kill passwords in 2005 and 2014...
ADAudit Plus | June 28, 2019Unmask malicious insiders with user behavior analytics Insider threats are both the most successful way to exfiltrate sensitive business data...
Mobile Device Manager Plus | June 28, 2019Prevent downtime in your organization with Mobile Device Manager Plus It goes without saying that downtime is bad for organizations—not only does it put...
ADSelfService Plus | June 27, 2019Bringing SSO to hybrid Active Directory As enterprises transition to a hybrid Active Directory (AD) environment, it’s important...
General | June 26, 2019The why and how of browser security The internet has reshaped the workplace, and internet browsers have become an...
Log360 | June 24, 2019Five reasons to choose Log360, part 1: User-friendly deployment and UI SIEM solutions are a must-have in any organization's security toolkit. They allow you to...
General | June 21, 2019Five worthy reads: Should NoOps be your new operations strategy? Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
Browser Security Plus | June 20, 2019Reported vulnerability in Evernote Web Clipper exposes browsing data of millions of users A critical vulnerability in Evernote's Web Clipper Chrome extension recently allowed...
General | June 18, 2019Boost your organization's productivity with these 5 password management techniques For some time now, many organizations have claimed they'd go password-less. Even tech...