Enhance the functionality and potential of your Intune or Azure AD environment.
500 SysAdmins recently shared their experience and insights with us. Download the white paper to gain a deeper understanding of the current state of the SysAdmin field.
Download our infographic on actionable data to learn more about how Endpoint Insights can positively impact your IT team and empower efficient processes.
Watch Sami Laiho as he discusses what privileged access management means and provides tips on how to move closer to a zero-trust environment. Plus, get a look into Recast Software's new PAM solution, Privilege Manager.
Recast Software has launched Recast Academy, a learning platform for Enterprise customers to train on our software’s features. Initial courses focus on Right Click Tools Enterprise and enable users to understand the vital features and functionality of our platform.
We recently covered Zero Trust principles broadly. Now let's talk more about how Privilege Manager contributes to certain areas of Zero Trust, including the principle of least privilege.
For many IT Administrators and SysAdmins, Recast Software is synonymous with Right Click Tools, our flagship product. Recast customers have more recently begun working with Endpoint Insights, our product folded into the Recast brand after the acquisition of Enhansoft in 2021. Endpoint Insights brings novel data into the MECM / SCCM environment to profoundly improve hardware and software management.
Watch this 5-part webinar series covering all things related to Recast Software's Endpoint Insights. From this series, you’ll walk away with knowing the replacement cost of a user’s devices, how to find all mapped network drives tied to a user or device, grouping devices such as monitors based on certain criteria, what Right Click Tools + Endpoint Insights really means, plus more!
Product experts give an in-depth view into how Right Click Tools helps reduce overall enterprise risk, ensuring compliance of encryption, privileged access, software updates, and more.
Kaspersky Labs identified software vulnerabilities as the leading cause of breaches in 2021, outpacing phishing for the first time ever. This data means that organizations need to add third-party patching to their cybersecurity position. If you aren’t patching third-party applications, it is important to get started now.
By Sami Laiho, Chief Research Officer at Truesec and Microsoft MVP in Windows and Devices for IT. Has applied the principle of least privilege in environments for over 20 years.
One of the tasks that often gets pushed to the wayside, but is very important, is managing devices in Active Directory (AD). As the Active Directory accumulates more Organizational Units (OUs), it’s easy to let objects become obsolete as time passes.
Did you know that Configuration Manager (ConfigMgr / MEMCM / SCCM) has over 500 built-in reports and dashboards? Yes, it is true! However, with so many to choose from and a lack of time for most to review all of them, finding the best SCCM reports can be challenging. So, I put together this list.
The User Manual for NT 3.1, published almost 30 years ago in 1993, explains that the security subsystem of the NT operating system is not built to withstand the use of local admin rights. Admins typically set settings and limited users can’t change them. When it comes to configuration, it’s supposed to work ...