Remotely Lock and Enforce Your Windows Group Policy Settings
A common complaint we hear from IT administrators is that no matter how well they perform Active Directory group policy management, their end users find a way to mess up the admins’ handiwork. Sure,...
View ArticleDeploy and Lock 3rd-Party Application Settings with Group Policy
Group Policy (GP) does a pretty good job of allowing IT administrators and security officers to manage their Windows-centric infrastructure. This includes tasks such as: configuring the Windows...
View ArticlePolicyLock: Keep End User Application Settings Locked Down — Coming This Summer!
Group Policy (GP) Management — words that can bring a range of emotions to overworked IT administrators. On the surface, Group Policy is a huge time saver for admins, controlling what Windows users can...
View ArticleReject The Limitations of Group Policy ADM / ADMX File Settings Management
PolicyLock, Raxco’s new application settings lockdown solution, makes managing and controlling end user application settings a lot easier and more efficient. Not only can PolicyLock lock down ADMX and...
View ArticleACL Lockdown: Keep Gold Image & End User Application MSI Settings Locked
As an administrator, you may think that because you have preconfigured settings into your applications or you’ve done the same for your gold images, your work — and worries about user misbehavior — are...
View ArticleManage Settings with the Group Policy Preferences Extension? Bad Idea —...
Group Policy Preferences are a set of Group Policy settings that were released with Windows Server 2008. The settings allow IT administrators to configure a wide range of settings for the computers in...
View ArticleKill Ineffective Login Scripts and Opt for Real Application Settings Lockdown
You want to change your application settings and ensure that your users can’t modify them, so you ingeniously create some nifty login scripts. Login scripts work great…until: You need to modify them —...
View ArticleEnsure IT Security Lockdown with Popular Application Settings Tool Kits
We think most system administrators agree that Group Policy is an extremely useful technology, making life so much easier when addressing all the issues associated with directory services. But as we’ve...
View ArticleGreen IT Initiative: Your Managed Desktop Solution
When you think of green IT initiatives, you probably tend to think of more popular ones like improving your data center cooling methods and data center floor layouts, consolidating servers through...
View ArticlePolicyLock is Here! Lock Down Application Settings Group Policy Can’t
After one of our most successful Beta tests ever, I’m happy to announce that PolicyLock is now generally available. What do I mean by one of our most successful Beta tests ever? Unanimous consensus by...
View ArticleSecurity Tip: How To Disable Java in the Enterprise
If you are in charge of security for your enterprise, or are responsible for the deployment and management of Java in your organization, then you know your business is at risk and exposed to potential...
View ArticlePolicyLock and BYOD Security
Much has been written and continues to be written about BYOD (Bring Your Own Device) — the benefits, opportunities, risks, potential pitfalls, security, policy issues and more. Without question, it...
View ArticleVDI BYOD Setup and Windows Images — Don’t Forget This
One of the countless ramifications of the BYOD (Bring Your Own Device) rage is an increase in VDI (Virtual Desktop Infrastructure) implementations. When users come to work with their Apple and Android...
View ArticlePolicyLock Review: “Usefulness is Without Question” for SysAdmins, “Dead...
As our newest product, PolicyLock has a ways to go to achieve the amount of recognition and industry awards bestowed upon PerfectDisk over the years. But after just a few weeks on the market, it’s on...
View ArticleFilling Holes in Endpoint Security
The online threats to an organization’s network security seem to grow each day. And with that comes increasing complexity for security and IT administrators. No matter the size of your organization,...
View ArticleYoung Rule-Breakers Put Company Security at Risk: How to Control BYOD
PCWorld reported this week that a survey revealed younger employees are far more likely to ignore company policies and put company security at risk. BYOD hasn’t helped. The respondents – 3,200...
View Article3 Ways to Secure Your BYOD Policy w/Mobile Malware Attacks on the Rise
They’re just getting warmed up. If you thought the security headlines in 2013 were bad, just wait to see what 2014 has in store according to a threat forecast released by cloud-based email and web...
View ArticleThe Single Cause of System Downtime You Can Actually Prevent
System downtime is expensive whether the cause is a power outage, premature system failure or software corruption. Find out how you can prevent the largest cause of web-based attacks and save hours of...
View ArticleNow You Can Lock User Settings for 140+ Applications with PolicyLock
PolicyLock now allows you to manage and lock down over 140 widely-used applications‘ settings so end users can’t modify or work around them, compromising your company’s security. And you can do it all...
View ArticleQuickly Disable IE Flash Add-on for 100s-1000s+ End Users (Even on XP)
As reported April 26, 2014, a serious Internet Explorer bug leaves users open to hackers, who have already used the exploit in “limited, targeted attacks” according to Microsoft. FireEye Research Labs...
View Article
More Pages to Explore .....