Quantcast
Channel: Devolutions Blog

RDM: End of Online Drive and Online Backup

Devolutions Online Drive will be removed on September 1st. Migrate your data to Devolutions Hub Personal or use the File Backup tool to avoid data loss.

View Article


Sysadminotaur #153 : Commented reality

View Article


New report reveals major shift in cybersecurity talent crisis

The cybersecurity talent gap isn’t about interest—it’s about skills. Hiring managers now prioritize technical capabilities over resumes, and seek talent from outside traditional pools.

View Article

Decoding passkeys: The key to a passwordless world

Explore the concept of passkeys and their potential to redefine digital authentication by eliminating the need for passwords.

View Article

Webinar: Operationalizing NIS2: Implementing key security controls with...

Learn how to operationalize NIS2 with Devolutions in our interactive webinar, featuring live demos and a live Q&A session.

View Article


April poll results: What’s your BEST April Fools’ Day prank?

Discover the best April Fools’ Day IT pranks from our community—from desktop chaos to keyboard hacks. Hilarious, harmless, and a little genius. See who pulled off the ultimate tricks!

View Article

Spotlight on: Devolutions' passkey support

Discover how Devolutions makes passwordless authentication effortless with passkey support across our products.

View Article

May poll question: Does your company use passkeys for authentication?

It's World Passkey Day! Join the movement toward passwordless logins—faster, safer, and phishing-proof. Vote in our poll & you could win a $25 Amazon gift card!

View Article


6 cybersecurity lessons we can learn from Star Wars

This blog explores six essential cybersecurity lessons inspired by Star Wars, blending IT best practices with memorable scenes from the saga to highlight the importance of vigilance and teamwork.

View Article


Revenge of the 5th: 5 big cybersecurity mistakes SMBs make

Discover 5 key cybersecurity mistakes SMBs make—revealed through the lens of Revenge of the Sith—and learn how to avoid them with help from Obi-Wan, Anakin, and the Devolutions team.

View Article

Spotlight on: Lansweeper synchronizer in Remote Desktop Manager

Centralize IT asset management with RDM’s Lansweeper sync. Automate syncing for secure, simplified control—boosting productivity and efficiency with ease.

View Article

Spotlight on: Supremo, a new Remote Desktop Manager-integrated remote access...

Discover Supremo: a secure, budget-friendly remote desktop solution for IT pros, teams, and MSPs — now integrated with Remote Desktop Manager.

View Article

Board Games at Devolutions: 2025 edition

From zoos to zero-gravity landings — here are 6 board games the Devolutions team is loving right now (plus some friendly competition and maybe a bit of sabotage).

View Article


Spotlight on: RDM CyberArk PVWA credential entry for PSM connection

RDM now supports CyberArk PSM connections via PVWA credentials and a new resolving mode, enabling secure, streamlined session launches without direct password retrieval.

View Article

Devolutions Renews SOC 2 Type II Report for Hub Business and Hub Personal

Devolutions has renewed its SOC 2 Type II report for the period of January 1 to December 31, 2024, reaffirming the strength and effectiveness of its security controls for Hub Business and Hub Personal.

View Article


Sysadminotaur #154: Port authority

View Article

Spotlight on: Streamlined SSH key management with Devolutions PAM

Streamline SSH key management with Devolutions PAM’s new built-in key rotation, offering centralized control, automated updates, and improved visibility for better security and compliance.

View Article


Strengthening cybersecurity with Devolutions — Essential 8 compliance

Learn how Devolutions aligns with the Essential 8 to enhance cybersecurity. Download our free white paper—no sign-up required!

View Article

Spotlight on: RDM CyberArk Secure Infrastructure Access (SIA) for RDP and SSH

Enhance privileged access management in RDM with CyberArk SIA: secure endpoint connections, minimal friction, and fewer authentication steps.

View Article

May poll results: Does your company use passkeys for authentication?

Over 40% of our community uses passkeys, and nearly all others are exploring them — a positive sign in the fight against phishing.

View Article