News

Last Updated on 11 Feb. 2016, Total: 295 Blog Posts

  1. Spiceworks Network Monitor Adds Connectivity Checks for “Internet of Things” Devices

    New features help IT professionals monitor IT services, processes, ports, and any device with an IP address in real-time... Read More

  2. Unitrends and CloudCheckr Partner to Help MSPs Build, Manage and Grow their AWS-Hosted Businesses

    Unique tool set enables managed service providers to improve margins with cloud backup and recovery offerings, and a low-cost delivery model... Read More

  3. LepideAuditor 16.1now better than ever with File Server Auditing

    LepideAuditor Suite now features File Server Auditing, permission Comparison and a new search feature... Read More

  4. December Newsletters Teaser

    Topics covered in CloudComputingAdmin.com, VirtualizationAdmin.com, MSExchange.org, WindowsNetworking.com and WindowSecurity.com monthly newsletters... Read More

  5. The City of Westminster Ensures Consistent Delivery of City Services, While Saving 180 Man-Hours a Year, with DH2i Container Management Software

    Growing Colorado City Turns to DxEnterprise Software to Achieve Greater Management Consistency and Efficiency Across Microsoft SQL Server Environment... Read More

  6. Jedi IT Security Code: 5 Tenets to Defend against Data Breaches

    Netwrix outlines common principles for IT pros to maintain data integrity and mitigate risks of cyber attacks... Read More

  7. Last chance to sign up for the webinar: How to Plan and Complete a Secure Office 365 Migration

    Live Webinar: December 10, 2015 @ 11am or 4pm EST | 8am PST or 1pm PST, US Time There are many pathways to an Office 365 migration, but completing the migration is only part of the solution. While Office 365 offers capabilities for Identity Management, it’s limited in protecting data once it leaves the platform... Read More

  8. DH2i Unveils New Sandbox Lab for the Rapid Proof of Concept (POC) Testing of Container Management Software for Microsoft Windows Applications

    New POC Lab Demonstrates How Enterprises Can Go from Standalone to High Availability (HA) Failover Clusters in Just a Few Minutes... Read More

  9. Security Concerns and Lack of Visibility Hinder Cloud Adoption, Say 65% of IT Pros

    Netwrix 2015 Cloud Security Survey reveals unauthorized access and account hijacking are the leading security risks associated with the cloud... Read More

  10. Dell creates security vulnerability unintentionally

    Dell ships laptops with rogue root CA, exactly like what happened with Lenovo and Superfish... Read More

Featured Links