Jörgen Nilsson is an IT Consultant with Onevinn, working since 1993 in that capacity. He also holds a Microsoft MVP in Enterprise Mobility and blogs at ccmexec.com.
We had so many questions during the webinar that we weren’t able to get to all of them. Our Solution Engineering duo Courtney Baty and Marty Miller have answered the remaining questions.
This version 5.0 release marks a significant shift in the backend infrastructure of the Recast Software product suite. We've rebuilt all our products from the ground up. This overhaul streamlines future update processes, while also paving the path for more secure 3rd-party integrations.
Recast Software has launched Recast Academy, a learning platform for Enterprise customers to train on our software’s features. Initial courses focus on Right Click Tools Enterprise and enable users to understand the vital features and functionality of our platform.
We recently covered Zero Trust principles broadly. Now let's talk more about how Privilege Manager contributes to certain areas of Zero Trust, including the principle of least privilege.
For many IT Administrators and SysAdmins, Recast Software is synonymous with Right Click Tools, our flagship product. Recast customers have more recently begun working with Endpoint Insights, our product folded into the Recast brand after the acquisition of Enhansoft in 2021. Endpoint Insights brings novel data into the MECM / SCCM environment to profoundly improve hardware and software management.
Kaspersky Labs identified software vulnerabilities as the leading cause of breaches in 2021, outpacing phishing for the first time ever. This data means that organizations need to add third-party patching to their cybersecurity position. If you aren’t patching third-party applications, it is important to get started now.
By Sami Laiho, Chief Research Officer at Truesec and Microsoft MVP in Windows and Devices for IT. Has applied the principle of least privilege in environments for over 20 years.
One of the tasks that often gets pushed to the wayside, but is very important, is managing devices in Active Directory (AD). As the Active Directory accumulates more Organizational Units (OUs), it’s easy to let objects become obsolete as time passes.
Did you know that Configuration Manager (ConfigMgr / MEMCM / SCCM) has over 500 built-in reports and dashboards? Yes, it is true! However, with so many to choose from and a lack of time for most to review all of them, finding the best SCCM reports can be challenging. So, I put together this list.
The User Manual for NT 3.1, published almost 30 years ago in 1993, explains that the security subsystem of the NT operating system is not built to withstand the use of local admin rights. Admins typically set settings and limited users can’t change them. When it comes to configuration, it’s supposed to work ...
Sami Laiho, a Microsoft MVP in Windows OS and a highly regarded security expert, recently collaborated with Recast Software to host a webinar, “Zero Trust with Sami Laiho.” Sami concisely made his case for Windows security in 2022.