LogMeIn Central Rated Top Endpoint Management Software in G2 Crowd

By verified product users on G2 Crowd, LogMeIn Central has been awarded the highest rated & easiest to use endpoint management software solution!

On top of those rankings, LogMeIn Central was also given top rankings for having the highest ROI, the smoothest implementation, & being the most usable.

G2 Crowd rankings are based on an algorithm that incorporates real-user satisfaction scores from review data. Thank you to all our users for the positive ratings!

To learn more, visit: https://www.g2crowd.com/categories/endpoint-management

 

         

PHISHING ALERT: FAKE EMAILS MIMIC LOGMEIN OFFER

We are getting reports from LogMeIn customers about suspicious emails that are designed to look like they are coming from LogMeIn — they have all the hallmarks of phishing attempts.

The reports are meant to look like a LogMeIn email. The email subject line is: You have earned 6 months of free subscription!”

We want to make it clear that these emails did NOT come from LogMeIn and people should NOT click on the links in these emails.

While we are working with our partners to remove these malicious websites, as part of our commitment to security, we want to make sure our users and the public are aware of this specific email, and provide an easy way for people to identify the tell-tale signs of phishing attacks.

If you have clicked a link in this email, we recommend changing your password and enabling two-factor authentication on your account as well as your users’ accounts.

Email subject line: You have earned 6 months of free subscription
Intended behavior/action: Tries to get you to open the embedded link which then downloads a malicious file.

         

Watch our latest Central Master Class

Last week, we hosted our third Central Master Class on the LogMeIn Client App & One2Many Task Management. These Master Classes are quarterly webinars that are designed to go in-depth into two features of Central to ensure that you are using Central to the best of its abilities.

In this Master Class, we covered: 

  • The most efficient way to install software and distribute files across multiple computers 
  • Our top tips for running scripts and automating manual tasks  
  • How to quickly connect to your remote computers without a web browser

To watch this Master Class as well as previous Master Classes, visit:  https://www.logmein.com/central/resources/masterclasses 

         

Double Threat: How Your Endpoints & Passwords Put You at Risk

From passwords resets to corporate network threats, today’s IT teams are increasingly burdened with time-consuming tasks that keep them from more strategic work. With this in mind, we created an informative infographic to demonstrate how your passwords and endpoints might be putting you at risk – and then show you how to address these problems.

 

         

LogMeIn Central Named a Top Endpoint Security Vendor

By a third-party reviewer, LogMeIn Central has been named one of the top 6 endpoint security vendors to watch in 2019.  This reviewing site focuses on Endpoint Security & Protection Platforms and posts about best practices when evaluating or maintaining an endpoint solution.

The reviewer writes:

“LogMeIn provides a comprehensive endpoint management and security solution indicative of the blurring lines between identity security and the traditional endpoint perimeter. The LogMeIn Central solution security portfolio includes anti-virus, patch management, proactive alerts, software inventory, and computer health monitoring, thereby providing a comprehensive package for enterprises struggling with perimeter security gaps or visibility issues.”

To learn more, visit: https://solutionsreview.com/endpoint-security/top-6-endpoint-security-vendors-watch/

         

Can your business afford a cyber-attack?

 

For small businesses, strong endpoint security is no longer a nice to have, but a necessity to proactively prevent threats and mitigate costs. According to the IDC, 70% of successful breaches begin at an endpoint. In addition, over the past 5 years, the number of breaches targeting small businesses has been on the rise. Small businesses need to improve their endpoint security or it is increasingly likely that they will experience a costly attack.

In honor of National Cyber-Security Awareness month, we investigated the types of endpoint breaches that are impacting small businesses and the most effective ways to proactively mitigate those threats to save costs and keep your endpoints secure.

Learn more on our website at https://www.logmein.com/central/resources/doingnothing

 

         

This National Cyber-Security Awareness Month, Focus on Patch Management

 

Every day it seems like there is another cyber-attack impacting small businesses. Per the Ponemon Institute, 61% of small businesses have experienced a cyber-attack in the past 12 months (up from 55% the previous year)1. In fact, the U.S. Securities and Exchange Commission estimates that most targeted cyber-attacks are directed at small businesses2.

As this landscape is rapidly changing and October is national cyber-security awareness month, it’s more important than ever for IT and MSP professionals to take the time to understand their vulnerabilities and to learn how to proactively protect themselves.

A key area where IT professionals can improve their ability to proactively protect themselves is against ransomware attacks. 52% of small businesses reported experiencing a ransomware attack in the past year and this number is on the rise1.

Luckily, there are tools available to IT professionals to help them proactively combat ransomware attacks. These tools focus on patching known vulnerabilities, which is an extremely effective way to stay ahead of cyber-attacks. Per Fortinet, 90% of cyber-attacks in the last year could have been avoided if people updated and patched their systems3. In addition, the research found that, of companies who experienced a cyber-attack, 60% experienced a successful attack for which a patch had been available for over a decade3.

The importance of utilizing these patch management tools is shown through the recent WannaCry cyber-attack.

WannaCry was a destructive ransomware attack that impacted more than 100 countries4. For the vulnerability that was attacked, Windows had released a patch a month prior. All the companies that fell victim to the attack had not implemented the Windows patch which left most IT departments and MSPs scrambling the days after the attack to lock-down and ensure their systems were properly patched. If these organizations had been proactive with updating their patching, they would have prevented the attack from impacting their networks and daily business operations.

With national cyber-security awareness month upon us, we should all be thinking through the best practices we should implement to improve our security and minimize our risks – and patch management is one of the best places to start.

 

  1. Ponemon Institute, ‘2017 State of Cybersecurity in Small & Medium-Sized Businesses (SMB)’, 2017. ​
  2. U.S. Securities and Exchange Commission, ‘The Need for Greater Focus on the Cybersecurity Challenges Facing Small and Midsize Businesses’, 2015.
  3. Fortinet, ‘Report: Dissecting Our Q2 Threat Landscape Research’, 2017.
  4.  Smarter MSP, ‘The Most Telling Cyber-Attacks and Data Breaches of 2017’, 2017.

 

         

Did you watch our latest Master Class?  

Last week, we hosted our second Central Master Class. These Master Classes are quarterly webinars that are designed to go in-depth into two features of Central to ensure that you’re using the product to the best of its abilities.  In our latest Master Class, we dove into the User Management and Alert features.

In this Master Class, we covered: 

  • How to simplify your user management by arranging users into groups and controlling permissions 
  • The fundamentals of setting-up, monitoring, and acting on Alerts to proactively address issues before they occur  
  • A closer look at how these features will make it easier for you to take control of critical IT task 

To watch this Master Class as well as previous Master Classes, visit:  https://www.logmein.com/central/resources/masterclasses 

 

         

IDC Reports: Endpoint Management Challenges Posed by Today’s Cyberthreats

The cyber-security landscape is ever evolving, and IT professionals must remain up-to-date with the current state of IT infrastructure to proactively protect themselves from threats.

To learn more about the current state of IT infrastructure, we reached out to an IDC Analyst, Phil Hochmuth, and asked him to evaluate 5 key questions related to effectively managing one’s IT infrastructure in today’s security landscape.

Download this report to learn: 

  • What are the key trends around endpoint management and the latest cyberattack methods? 
  • How are IT teams set up to handle sophisticated attacks?   
  • What are the biggest mistakes internal IT organizations can make in terms of endpoint management? 
  • What is the cost of making mistakes around endpoint management?    
  • What are the mission-critical capabilities that organizations should look for when evaluating an endpoint management solution?  

Download the report here.

 

 

         

You Speak, We Listen: New Central Improvements Based on Your Feedback 

Our customers are always our number one priority. We want to continuously innovate and enhance the Central platform so that we can better serve your interests and make your lives a little bit easier.  One of the ways we are working towards this goal is by listening to your feedback and making the product improvements that you request. 

We’re excited to release a handful of improvements requested by our customers. Read about the improvements below and watch the video to see our Product Manager, Kevin Kuchera, walk through each of these improvements live in the product.  

Deployment Link  

We simplified the process of copying deployment links by adding a column on the deployment tab that allows you to copy the deployment link with the click of one button. This makes it easier to share the link in a SMS messenger or email. 

PowerShell 

One2Many now allows PowerShell commands! Use this powerful scripter to push out multi-line commands.  

One2Many Color Coding 

When writing long or complicated scripts in One2Many, we heard that it was difficult to keep track of key inputs. We added color coding to our One2Many scripts to help. Now it functions similar to a script editor, minimizing syntax errors by highlighting numeric values in green and text strings in red.    

Increased Reporting Capabilities  

We’ve added a new report to our toolbox. You can now see those who have been managing files or accessing computers from the back-end (background access) with an accurate duration. 

LogMeIn for Linux-Beta 

We recently released a Linux-beta. Try the product to easily add Linux machines into your Central account and get zero-configuration terminal access from any browser. Download now for full access.