Endpoint Central | June 27, 2018Zacinlo: Adware for Windows 10 with a spyware twist A recent resurgence of an adware strain has begun targeting systems running on Windows 10...
Applications Manager | June 26, 2018Applications Manager training recap: Week 3, Enabling DevOps to optimize application performance We hosted the third session of our free, four-part Applications Manager training series on...
ServiceDesk Plus | June 26, 2018Start managing Active Directory from your help desk with the new AD management plug-in ServiceDesk Plus users can now use an AD management plug-in to create and manage Active...
Log360 | June 25, 2018Contest alert: Take part in the Log360 product pro challenge We are delighted to announce our "Log360 product pro" challenge, a unique community...
General | June 22, 2018Five worthy reads: How secure is your smart voice assistant? Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
DataSecurity Plus | June 22, 2018Free webinar: Learn how to protect your enterprise from ransomware What's the first thing that comes to mind when you think about ransomware defense?...
General | June 21, 2018[Free webinar] Log in just once to access over 100 enterprise applications Did you know that over 70 percent of users have more than 10 passwords to remember?...
Applications Manager | June 18, 2018Applications Manager training recap: Week 2, Improving end-user experience We hosted the second session of our free, four-part Applications Manager training series...
Identity and access management | June 14, 2018Free webinar: Tracking Active Directory attacks and user logons Microsoft Active Directory is the center of most enterprises' network identity management....
Endpoint Central | June 14, 2018Microsoft Patch Tuesday June 2018 Updates Microsoft has announced its Patch Tuesday updates for June, and this month's list of...
Applications Manager | June 13, 2018Applications Manager training recap: Week 1, Discover and visualize application dependencies On June 6th, our product experts hosted the first session of our free, four-part...
General | June 8, 2018Five worthy reads: Does your security operations center really make you immune to cyberattacks? Five worthy reads is a regular column on five noteworthy items we’ve discovered while...