Applications Manager | August 29, 2018Tackling the top four challenges of Azure SQL Database monitoring With large enterprises increasing their focus on public cloud providers, Microsoft Azure...
Mobile Device Manager Plus | August 28, 2018Tinder hack targeting RAF's F-35 program emphasizes the need for mobile device management While security professionals are busy protecting enterprises against DDoS attacks,...
IT Security | August 27, 2018Simplifying security auditing, Part 3: Keeping insider threats in check Insider threats are on the rise. In fact, both administrators and average employees are...
Log360 | August 23, 2018Unravel security incidents using event correlation [Webinar] Event correlation helps you wrap your head around the countless number of events going on...
Identity and access management | August 23, 2018Monitoring service account password changes in Active Directory Service accounts are dedicated Active Directory (AD) accounts that are used to manage...
Mobile Device Manager Plus | August 22, 2018Prevent Man-in-the-Disk attacks using the right mobile security procedures Organizations that offer employees the freedom of mobility gain some advantages, which...
General | August 21, 2018Effective password management techniques for Active Directory [free webinar] Passwords have formed an integral part of Microsoft Active Directory since its inception....
General | August 21, 2018Simplifying security auditing, Part 2: Auditing systems that store sensitive data In part 1, we looked at an overview of auditing servers. In this blog, we'll discuss which...
AlarmsOne | August 20, 2018Auto-remediate your IT incidents using scripts It's 2am. You receive a notification from your monitoring tool. A host server ran out of...
General | August 17, 2018Five worthy reads: The "edge" is near! Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
IT operations management and observability | August 16, 2018ITOM seminar in Australia: Attend. Learn. Leverage. The biggest challenge enterprises face today is embracing new technologies and using them...
IT Security | August 15, 2018Simplifying security auditing, Part 1: Regularly reviewing server activity Everyone knows about the importance of log management in IT security. Yet, organizations...