General | March 19, 2018Password synchronization between Active Directory and Salesforce accounts As the number of Salesforce user accounts increases within your organization, managing...
General | March 16, 2018Five worthy reads: Kickstart your GDPR journey Five worthy reads is a regular column on five noteworthy items we’ve discovered while...
IT Security | March 16, 2018GDPR prep steps—Part 1 The deadline for the General Data Protection Regulation (GDPR) is looming closer. Are you...
Mobile Device Manager Plus | March 15, 2018Got Chromebooks? Mobile Device Manager Plus now supports those too! Good news for all the enterprises that have jumped on the Chromebook bandwagon: we've...
General | March 15, 2018Why automation is the best thing for compliance reporting The main purpose of compliance auditing is to identify how well a company is following...
Endpoint Central | March 14, 2018IT service management's ever-changing landscape It's easy to see that the IT service management (ITSM) landscape is changing quickly. In...
Endpoint Central | March 14, 2018Microsoft Patch Tuesday March 2018 updates Compared to March 2017, this month's Patch Tuesday is rather tame. This time last year,...
EventLog Analyzer | March 13, 2018Talk to our experts about the essentials of log management Log management is a pillar of security information and event management (SIEM), and is...
AlarmsOne | March 9, 2018AlarmsOne introduces two-way tracking of alarms and tickets AlarmsOne already has built-in integrations with SaaS-based help desk tools such as...
Identity and access management | March 8, 2018Tracking Group Policy changes: Why you should look beyond native auditing Group Policy is undoubtedly one of the most powerful features of Active Directory. It...
Identity and access management | March 6, 2018ADManager Plus' Active Users report for Sarbanes-Oxley (SOX) audit In this blog, we'll discuss how to generate an Active Users report for SOX audits with a...
General | March 6, 2018University of Northern Colorado's response to cybersecurity breach exemplifies GDPR compliance Another day, another cybersecurity breach. The University of Northern Colorado (UNC) has...