9 Critical Skills for Landing an IT Job in 2019
Programming, website design and development, networking – these were the valuable IT skills of the late 20th and early 21st centuries. And there is no reason to think that they are not still useful....
View ArticleHow to Update Your Devolutions Password Server Registration Serial
If you replace the lock on your door, then obviously your old key won’t fit. Well, the same is true when you renew your Devolutions Password Server license: you’ll get a new registration serial, which...
View ArticleNew Employee Spotlight: Marie-Soleil Wilmotte, Quality Assurance Specialist
Hello everyone,Today I am pleased to introduce you to our new QA Specialist, Marie-Soleil Wilmotte. Our QA team keeps growing, because we want to ensure the solutions we provide are tested and...
View Article5 Cybersecurity Quick Wins
One of the defining features of cybersecurity is that it is an ongoing (read: endless) commitment vs. a one-time event. Despite this, many IT security professionals are under extreme pressure to...
View Article5 Robots Everybody Wants to Work With
Hopefully you work with great co-workers who help you achieve work-related tasks and goals, while also making the work experience more fun — whether it’s having lunch together, discussing geeky topics...
View ArticleDevolutions Under the Hood
As part of our ongoing focus on helping Sysadmins and other IT professionals enhance security and strengthen governance, I am delighted to announce that we have integrated Single Sign-On (SSO) for...
View ArticleNew Employee Spotlight: Félix Boulet, Operational Security Specialist
As you may have noticed, one of the fastest-growing teams here at Devolutions is our Security Group. And since you can never have too much security talent, please allow me to introduce you to the...
View ArticleThe Basics of Zero Trust Architecture + 8 Best Practices
The conventional approach to information security is to deploy enforcement mechanisms at the network perimeter, such as next-generation firewalls, proxy servers, network intrusion detection systems,...
View ArticleDoes Your Organization Have All 6 Pieces of a Comprehensive PAM Strategy?
Despite the fact that the average cost of a data breach has skyrocketed to $3.62 million, and 60% of small businesses go out of business within six months of getting hacked, an alarming 54% of...
View ArticleSOC 2 Certification – We’re Almost There!
Recently, we highlighted that we have added 2FA to Devolutions Cloud, and we plan on expanding 2FA across all of our products in the coming months. Today, we take a deeper look at another major...
View ArticleNew Employee Spotlight: Nathan Lachance, Software Developer
Hello everyone,Today, the tradition continues as I introduce you to the newest member of our Development Team: please give a warm Devolutions welcome to Nathan Lachance!Nathan is working on one of our...
View ArticleRemote Desktop Manager Enterprise 2019.1 Beta Is Here
Remote Desktop Manager 2019.1 (aka 15) has arrived! Our team has been working hard for several months to get RDM 2019.1 ready! You can now try it by joining the beta!Remote Desktop Manager 2019.1 Beta...
View ArticleFebruary Poll Results: Is Your Organization Using Session Recording — Why or...
Last month, we asked you to let us know whether your organization is using session recording – along with an explanation for why it is or why it isn’t. It turns out the overwhelming majority of you are...
View ArticleMarch Poll: What Are the Biggest Pros and Cons of Your Remote Access Tool?
In the past, we’ve asked you to share what remote access tool you use. With this month’s poll, we’re diving deeper and would like to know about your experiences. Specifically, we’d like to know: what...
View Article[IMPORTANT ANNOUNCEMENT] Password Vault Manager Now Fully Integrated in...
We are pleased to announce that Password Vault Manager (PVM) is now fully integrated in Remote Desktop Manager (RDM).Why Did We Do This?Password Vault Manager has been around for many years helping...
View ArticleThe Basics: How to Manage Role-Based Access Control Using Vaults in Remote...
The more clothes you have, the more drawers you need to keep things neat and tidy (actually for me, I just need a beautiful, glorious, huge walk-in closet!). Well, the same goes for entries: the more...
View ArticleSurprise! NIST Changes Course and Advises Against Regularly Changing Passwords
The U.S. National Institute of Standards and Technology (NIST) has updated its recommendations for user password management, and some of the advice is causing quite a stir across the InfoSec world.Out...
View ArticleCan AI Be the Answer to Data Protection and Private Security ?
THIS ARTICLE WRITTEN BY PAULINE FARRIS, FREELANCE WRITER AND TRANSLATOR, IS PART OF OUR GUEST BLOG SERIES. PLEASE CONTACT US IF YOU WOULD LIKE TO BE FEATURED ON OUR BLOG.AI – The Potential Answer to...
View ArticlePasswords vs. Passphrases: Let the Battle Begin!
Welcome fight fans to our main event of the night – the heavyweight championship of the account protection world! In the red corner is the popular fan favorite: PASSWORD. And in the blue corner is the...
View Article