July 5, 2023
Over several years and in some cases decades, organizations have adopted a patchwork of IT management and security tools. Some cover very specific functions; others deal with certain platforms, devices, or operating systems. In this era of hybrid enterprises with...
June 30, 2023
Published originally on June 30, 2023 by Drew Robb on TechRepublic. Not all patches are the same, explained Syxsense’s chief customer success officer Robert Brown. Some are strictly updates that introduce new features, drivers and or firmware. Other patches fix issues...
June 29, 2023
Published originally on June 29, 2023 by Drew Robb on TechRepublic. Traditionally, approaches to security focus on the perimeter. Once inside the walls, cybercriminals typically find a soft center that they can exploit by moving around the enterprise, infecting system...
June 28, 2023
In a previous post, we detailed how keeping up to date on endpoint security and management best practices along with deploying important updates or urgent patches can be difficult for organizations. In this post, we discuss why unified endpoint management...
June 24, 2023
Published originally on June 23, 2023 by Drew Robb on TechRepublic. Cybersecurity has always been challenging, but with the cloud becoming more complex, the Internet of Things more advanced and remote work more embraced, security and endpoint management face a...
June 13, 2023
Microsoft releases 69 fixes this month including 6 Critical and 4 CVSS Rated 9.8 There are 6 Critical, 60 Important, 2 Moderate and a single Low severity fix this month. Microsoft Windows, Windows Components, Office and Office Components, Exchange Server, Microsoft...
June 3, 2023
In a series of blog posts in April, we detailed the many tools used in security and endpoint management, why consolidation is needed, and why it makes sense to leverage products that combine endpoint and vulnerability management capabilities. In this...
May 30, 2023
In a previous post, we detailed the vast array of endpoints a typical enterprise possesses, why having too many devices can open the door to malicious cyber actors, and the importance of tool consolidation to help manage endpoint operations and...
May 24, 2023
In Part Two of this series, we highlighted that the more tools there are in place for IT management and security, the less secure the enterprise becomes. Those with more than 10 tools running were found to have large numbers...
May 22, 2023
In Part One of this series, we laid out the extent of tool sprawl in the enterprise. According to a recent Enterprise Strategy Group (ESG) survey, two thirds of enterprises utilize ten or more IT management and security applications. One...