5 Common Password Security Mistakes
We all know that today’s hackers are nothing like the “script kiddies” of years past. Back in the old days, hackers were usually interested in wreaking havoc, destroying machines, and getting on the n...
We all know that today’s hackers are nothing like the “script kiddies” of years past. Back in the old days, hackers were usually interested in wreaking havoc, destroying machines, and getting on the n...
If you’ve started exploring the new RDM 13, you may be wondering what we’ve done with the feature that allowed you to share favorite sessions and entries with other users. Yes, that’s right, I said “a...
Last month, we asked whether you’re Windows or Mac — and why. While we hoped for some great responses, we were amazed by how many people participated. Thank you to everyone for sharing your opinions a...
Controling the IT chaos in your world is a challenge — especially when you’re running multiple apps at the same time. That’s why we think you’ll like (or maybe even love) an improved feature in RDM 13...
As you know, security is a top priority these days — especially as data breaches become more common, complex and costly. And if you’re a sysadmin or you work anywhere in or around SecOps or InfoSec, y...
If you have dozens, hundreds or thousands of entries in Remote Desktop Manager (RDM), you probably wish there was a fast and easy way to find the specific entry you need, when you need it. Well guess ...
History is full of big battles. For example: the first battle between Jedi and Sith happened in 6900 BBY (before the Battle of Yavin). Star Wars Break Now, I know that you’re here to learn about the ...
Last month, we asked you: “Which tasks in your job would you like to be automated by AI?” It definitely seems that many of you are looking for the improvement of Artificial Intelligence to automate so...
You know how frustrating it is when another user disconnects you from a server? Sure, it’s not personal — but it’s still annoying. Well, that suffering is over thanks to the new Check Out feature, whi...
After reading our community member Frank McCourry’s very interesting article about surviving changes in the IT world, I was inspired to discover new ways that I could adapt. That led me to YouTube, wh...
“I am proud to say that RDM is the only tool that we now use to centralize RDP, SSH and VNC”. - Germano Saffier, IT Architect Germano da Cunha Diogo Saffier is an experienced IT Architect who we are ...
While data breaches have dominated the InfoSec headlines (and increasingly the mainstream ones, too) for several years, they aren’t a new phenomenon. In fact, one of the first recorded hacks took plac...
THIS ARTICLE WRITTEN BY FRANK MCCOURRY, VP AT HOLLAND COMPUTERS, IS PART OF OUR GUEST BLOG SERIES. PLEASE CONTACT US IF YOU WOULD LIKE TO BE FEATURED ON OUR BLOG. If there is one thing that is consis...
Hello RDMers, I am certain you all have heard of our Private Vault, a user centric repository allowing users to create entries that only they can access. However, have you heard about our new Private ...
SAAS vs Entrust IdentityGuard vs Microsoft Azure Multi-Factor Authentication Last week we did an updated review of 2FA solutions that was targeted toward single users, but what about company-wide solu...