[Tech Brief Webinar March 21, 2017] Elevating your Xtraction Dashboards to the Next Level with More Advanced Design Techniques

By donotreply@ivanti.com Elevating your Xtraction Dashboards to the Next Level with More Advanced Design TechniquesLIVE WEBINAR DURATION: 1 hour DATE & TIME: March 21, 2017, 9:00 am MST | 11:00 am EST | 4:00 pm GMT EVENT DETAILSXtraction is a self-service, real-time dashboard & reporting software. It enables IT and non-technical staff to create and … [Read more...]

[Tech Brief Webinar March 16, 2017] Optimizing your workflow with Velocity

By donotreply@ivanti.com Optimizing your workflow with VelocityLIVE WEBINAR DURATION: 1 hour DATE & TIME: March 16, 2017, 8:00 am MST | 10:00 am EST | 3:00 pm GMT EVENT DETAILSYou have selected Android for your next generation mobile computers. Now, let us help you plan the progression from your Windows CE telnet client to a modernized user interface with … [Read more...]

[Tech Brief Webinar March 14, 2017] Application Manager for Windows Servers

By donotreply@ivanti.com Application Manager for Windows ServersLIVE WEBINAR DURATION: 1 hour DATE & TIME: March 14, 2017, 9:00 am MST | 11:00 am EST | 4:00 pm GMT EVENT DETAILSIvanti Application Manager powered by AppSense is the ‘Swiss Army knife' in the Enduser Computing team's toolkit. Application Manager enables crazy-busy admins to remove end users' admin … [Read more...]

10 Ways to Reduce Spam in Your Inbox

By Brad.Wyro Before the invention of email, mail that arrived in your physical mailbox often contained pamphlets, sales brochures, credit card offers, and product catalogs. Much of this waste was thrown away and ended up in a landfill somewhere. Today, the equivalent and often more annoying nuisance is spam. Spam comes in many forms. Some examples include dubious product claims, miracle … [Read more...]

Vulnerability Management Dashboard

By Stephanie Dunn Tenable.io Vulnerability ManagementAlong with traditional assets, dynamic assets such as mobile devices, containers, and cloud-based solutions are changing the way organizations deal with vulnerability management. To manage these effectively, you need a streamlined way to assess your organization's existing security posture. Leveraging Tenable.io™ enhanced vulnerability … [Read more...]

The six pillars of identity access management nerdvana

By Casper Manes Identity and Access Management, or IAM, is becoming a key component of business information systems as we see a growing trend towards outsourced applications, attacks on identity, and a need to centrally manage and secure applications. Source:: GFI TalkTechToMe-All … [Read more...]

How to Mentor a Perfectionist

It never ceases to amaze us. Bring up the topic of perfectionism in a room full of corporate CEOs, college presidents, or U.S. Naval Academy midshipmen, and you’ll see the same knowing smiles and nods of the head. Moreover, you’ll hear thinly veiled bravado about who among them is the most-perfect perfectionist. Many of them will extol the virtues of seeking perfection, and more than a few will … [Read more...]

New features in GFI LanGuard 12.1

In the latest version of GFI LanGuard, some changes have been introduced to the way licence keys are handled in the product. GFI LanGuard will now make use of account based licence key management, instead of manual inputting of product keys. By logging in with your GFI Customer Account credentials through the product’s interface, you will be able to automatically import your licence keys without … [Read more...]

2017 Is a Transformative Year for Security

By Eileen Bator For organizations around the globe, security is evolving from a technology issue to a business issue. CEOs, board members and risk managers are asking questions and seeking solutions from their CISOs. With technologies such as IoT, cloud services, industrial control systems and DevOps in the spotlight, 2017 will be a game changing year for security. Tenable.io, our new … [Read more...]

Ransomware goes into stealth mode – What you need to know and what you can do!

By Joseph Carson Ransomware has become a major threat and high risk to many individuals and organizations worldwide. It is a very destructive variant of malicious malware that when it impacts systems it makes critical systems and sensitive information inaccessible until a ransom is paid, typically bitcoins within 72 hours and if unpaid the key to unlocking the data is deleted making it almost … [Read more...]