Top News

Best alternative to rdcman devolutions blog

Microsoft Discontinues Remote Desktop Connection Manager (RDCMan) + Invitation to Try Remote Desktop Manager (RDM)

In March, Microsoft announced that it was discontinuing Remote Desktop Connection Manager (RDCMan) due to a major security flaw (CVE-2020-0765). Here is the bulletin: An information disclosure vulnera...

SOC2 compliance achievement devolutions blog

[NEWS] Devolutions Achieves SOC 2 Type II Certification

We are proud to announce that Devolutions has completed a SOC 2 Type II report which details the management’s description of Devolutions Password Hub (DPH) and the suitability of the design and operat...

The basics of phishing devolutions blog

The Basics of Phishing

I know that the IT pros who frequent our blog know all about the dangers of phishing. Unfortunately, there’s a good chance that many of your non-technical colleagues are less informed. Yes, they proba...

Why account brokering is better than resetting passwords devolutions blog

Why Account Brokering Is a Better Option than Resetting Passwords + How Devolutions Can Help

For several years, resetting passwords (a.k.a. account rotation) has been a standard best practice. For those outside the IT security world, this involves automatically generating a new password each ...

10 tips to stay safe from cyber threats devolutions blog

[COVID-19] 10 Tips to Stay Safe from Cyber Threats While Working from Home

In the past, remote workers — who were typically called teleworkers or telecommuters — were the rare exception, and the envy of folks who had to endure a miserable commute, or slog away from 9-5 in a ...

Top5 strong cybersecurity policy devolutions blog

5 Elements of a Strong Cybersecurity Policy

For any company in the digital age, cybersecurity is an obvious area of concern. If your company holds any kind of sensitive or otherwise valuable information — such as identity documents, personal re...

Sysadminotaur 092 noise devolutions blog

Sysadminotaur #92: Noise

Configure secure gateway remote desktop manager devolutions blog rdm

How to configure a secure gateway in Remote Desktop Manager

Learn how to configure a secure gateway in Remote Desktop Manager to enhance your network security. Follow our detailed instructions to set up secure connections and protect your data effectively.

Remote desktop manager linux devolutions blog rdm

Get an Early Access Preview of Remote Desktop Manager for Linux

Remote Desktop Manager for Linux is now available to everyone! Click here for more information on RDM for Linux. As you may recall, earlier this year our CEO David posted the Devolutions 2020 Roadmap...

Update devolutions password server security blog

Update on Devolutions Password Server Security Provider Deprecation

Hello RDMers! This is Mathieu Morrissette from the Devolutions Security Team. As you may already know, we have been working on deprecating the security providers in Devolutions Password Server. Previo...

6 cybersecurity careers to consider devolutions blog

6 Careers in Cyber Security You Should Consider

With more and more parts of our lives going online and then being stored, it’s no surprise that keeping our computers, networks and data secure is more important than ever. And if you’re fired up to p...

Configure-Roles-Permissions-Devolutions-Password-Hub

How to Configure Roles and Permissions in Devolutions Password Hub

The start of a new year is all about making resolutions — usually the same ones we’ve made many times before, like: eat healthier, workout more, save money, lose weight, build a wine cellar (oops, sor...

7 reasons upgrade rdm free rdm enterprise devolutions blog remote desktop management

7 Reasons to Upgrade from Remote Desktop Manager Free to Enterprise

Just like all of you, here at Devolutions we take pride in our work. And one of the things that gives us a great deal of satisfaction is that Remote Desktop Manager Free isn’t nagware, donationware or...

5 dangers leaving password management employees devolutions blog remote desktop manager rdm

5 Dangers of Leaving Password Management to Employees

Employees who can “manage themselves” are highly valued. After all, nobody wants to (or should want to) micro-manage every little thing an employee does. Micro-managing is not only tedious for everyon...

Prevent breaches by negligent employees devolutions blog

How to Prevent Breaches Caused by Negligent Employees

Everyone knows that the cyber threat landscape is constantly getting worse. But what may come as a surprise is that the enemy isn’t just hackers who populate the dark web. It’s also negligent employee...

Sysadminotaur 091 compromised devolutions blog

Sysadminotaur #91: Compromised

Devolutions password server update new pam devolutions blog privileged access management

[NEW RELEASE] Devolutions Password Server 2019.2 with its New PAM Component

Last year, our Business Architect Maurice shared our roadmap for a Privileged Access Management (PAM) solution that is robust, flexible, scalable, and affordable for SMBs. After a great deal of hard w...

Remote desktop manager setting offline mode devolutions rdm blog

Offline Mode

Imagine that you have no internet access — perhaps you’re working in a remote location, your ISP goes down, or you’re in an environment with sporadic network availability — and you need to access your...

Problems setbacks cyber security training devolutions blog

The Main Problems and Setbacks of Cyber Security Training

As a business, you’re always at risk of a cyber security breach or attack. Your employees are a big part of assessing various levels of risk, so you need to make sure they’re properly equipped. A lot ...

Top 7  information technology trends devolutions blog ai

Top 7 Information Technology Trends for 2020 Everyone Should Know

In the past half-decade or so, technology has been advancing at a very rapid pace. As a result, predicting the yearly trends in information technology is extremely difficult, and it’s definitely possi...