OS Deployer | July 20, 2019What is Windows 10 migration, and how do you implement Windows 7 to Windows 10 migration? Windows 7 to Windows 10 migration Microsoft has announced end of life (EOL) for Windows 7...
General | July 19, 2019Five worthy reads: Is your enterprise dealing with data sprawl properly? Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
OpManager | July 17, 2019OpManager bags gold—listed in Feedspot's top networking blogs and sites to follow in 2019 Great news! The OpManager blog has ranked #15 in Feedspot's top 100 networking blogs and...
ADAudit Plus | July 17, 2019Detecting first time processes on member servers to protect against attacks In a previous blog, we saw how ADAudit Plus’ user behavior analytics (UBA) capabilities...
ADSelfService Plus | July 16, 2019Complying with NIST password guidelines Passwords are the most widely used form of authentication across the globe and serve as...
Log360 | July 15, 2019Five reasons to choose Log360, part 4: Advanced security features Part two and part three of this blog series gave a detailed look at Log360's in-depth...
Mobile Device Manager Plus | July 12, 2019Agent Smith materializes from the matrix of Android malware There’s a new shapeshifting strain of Android malware in the mix. It replaces legitimate...
Patch Manager Plus | July 10, 2019Microsoft Patch Tuesday July 2019: Six publicly disclosed vulnerabilities, two zero-day flaws The much awaited Microsoft Patch Tuesday updates for July 2019 are here. If you're a...
Log360 | July 8, 2019Five reasons to choose Log360, part 3: Comprehensive network auditing In the previous post, we discussed the various environments that Log360 helps you audit...
General | July 5, 2019Five worthy reads: Educating the education sector on cybersecurity Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
RecoveryManager Plus | July 5, 2019Why litigation holds are not a viable alternative to backups Microsoft does not provide backup and recovery tools for its Office 365 services and has...
ADAudit Plus | July 4, 2019Monitoring user logon activity to identify compromised accounts In a previous blog, we saw how ADAudit Plus' user behavior analytics (UBA) capabilities...