In our last cybersecurity post on Devolutions, which explained how our MDR service works, we received a lot of great feedback. But we repeatedly got one question that surprised us: “Why would I ever t...
SysAdmin Appreciation Day is happening on July 30, 2021. This is an annual event when colleagues and customers take the opportunity to thank dedicated, competent, and hard-working SysAdmins (and other...
Summertime is the perfect time for vacation and relaxation, but it is also an opportunity to take a step back and reflect on what is to come. Building a new product from scratch and make it commercial...
Learn how to use the multiple monitor span display feature in Remote Desktop Manager. Follow our detailed guide to set up and optimize your RDP sessions across multiple screens for enhanced productivity.
“All of our Consultants and Developers are now using Remote Desktop Manager, and they simply can’t work without it anymore.”—Ron van Elteren, Technical Consultant, Aptean
Client Snapshot: Aptean
Aptea...
To better streamline our vulnerability disclosure process and promote transparency across the security of our products, we are pleased to announce that Devolutions has been authorized by the CVE Progr...
A new feature article by our VP of Business Solutions, Maurice Côté, has been published by The Record.
In the feature article, Maurice lists three tools that all organizations — including smaller busi...
While the pandemic is not over — some health experts say that “herd immunity” may not be achieved until 2022 or beyond — there is growing (but cautious) optimism that the worst-of-the-worst is behind ...
Legendary crooner Frank Sinatra — and a countless number of inebriated wedding guests who fancy themselves as karaoke superstars — have grabbed the mic and belted out the classic song My Way, which in...
It is not malware. It is not spyware. It is not Trojans. It is not even DDoS. No, according to experts the title of the scariest beast on the cyberthreat landscape now belongs to ransomware.
What is R...
As we all know, working in the IT world can be difficult; especially these days, when so much of an organization’s success — or make that its survival — depends on a secure and functional tech ecosyst...
Working in IT is always stressful. But over the last year and a half, many IT professionals have been forced to deal with unprecedented pressure, expectations, and deadlines. And even though things on...
Benjamin Franklin once said: “An investment in knowledge always pays the best interest.” On the other hand, author Anthony J. D'Angelo cautioned: “In your thirst for knowledge, be sure not to drown in...
There are some horror movie franchises that get scarier and scarier with each release. Well, the cybercrime landscape is like that: just when you think that things are as frightening as they can get…t...
Let’s roll out the red carpet, start the drumroll, and let the white doves fly as we welcome a new credential type to the Password Hub Family: Azure Service Principal.
About Azure Service Principal...
To say that the last 18 months have been unkind to many organizations is like saying that the sun is rather warm, or that the Himalayas are somewhat hilly. Frankly, the past year-and-a-half has been b...
Hello fellow video game enthusiasts! After skipping last year due to the pandemic, E3 came roaring back to life in 2021 from June 12-15. I had the good fortune of being selected by Devolutions to atte...
Thumbnails are good things because they tell us at a glance what something looks like — and we can determine whether it’s worth our time to drill down and learn more. But do you know what’s even bette...
Explore the pros and cons of fingerprint recognition technology for secure authentication. Understand its benefits and limitations to make decisions about using biometric security in your systems.