Identity and access management | September 21, 2017Active Directory from A to Z! Now that summer is over, we are delivering a variety of webinars all geared to increase...
Log360 | September 20, 2017Adopting a SIEM solution? Here's what you need to know Cyberattacks have become an everyday affair, especially with the WannaCry attack and...
Mobile Device Manager Plus | September 19, 2017Day-one support for iOS 11 When news of another OS release breaks, every user eagerly awaits the day they'll be able...
Endpoint Central | September 18, 2017Microsoft reports 81 zero-day exploits—Patch your desktops now to escape cyberattacks Patching vulnerabilities is always a priority, but patching is even more important when...
IT Security | September 16, 2017Taking stock of your security posture after the Equifax cyber breach Equifax, a leading credit bureau, was victim to a massive cyber breach a few months ago....
Endpoint Central | September 15, 2017Secure your endpoints: Locky ransomware launches massive email campaigns Just when organizations were starting to feel safe after WannaCry and Petya, security...
Exchange Reporter Plus | September 14, 2017Use a hybrid Exchange environment? Exchange Reporter Plus has got your back! Cloud technology is becoming important for most companies, sometimes with entire...
AlarmsOne | September 13, 2017Curb alert noise and stay on top of critical alerts Our criteria-based alerting system has already helped countless organizations filter out...
Endpoint Central | September 12, 2017Desktop management for macOS High Sierra Apple launched its current operating system macOS Sierra on September 20, 2016. Almost a...
General | September 8, 2017#Uncomplicate your IT with integrated ITOM software Technology is supposed to make our lives easier, but it often unintentionally makes life...
ADManager Plus | September 8, 2017Start streamlining GPO management with ADManager Plus Wise are the administrators who create Active Directory (AD) objects and apply GPOs to...
Identity and access management | September 7, 2017Ransomware basics: Part 3 Even as I write this, I get the feeling that this blog series is too basic, but with the...