By verified product users on G2 Crowd, LogMeIn Central has been awarded the highest rated & easiest to use endpoint management software solution!
On top of those rankings, LogMeIn Central was also given top rankings for having the highest ROI, the smoothest implementation, & being the most usable.
G2 Crowd rankings are based on an algorithm that incorporates real-user satisfaction scores from review data. Thank you to all our users for the positive ratings!
To learn more, visit: https://www.g2crowd.com/categories/endpoint-management
We have received additional reports of similar emails being sent to LogMeIn customers from new malicious domains. We want to make it clear that these did NOT come from LogMeIn and people should NOT click on the links in these emails. Please be sure to delete this message if you receive it.
While we are working with our partners to get these sites taken down, we want you to be aware of the specific phishing email below. As always, if you have clicked a link in this email, we recommend changing your password and enabling two-factor authentication on your account as well as your users’ accounts.
We are getting reports from LogMeIn customers about suspicious emails that are designed to look like they are coming from LogMeIn — they have all the hallmarks of a phishing attempt.
These fake emails are meant to look like a LogMeIn email. The email subject line is: “LogMeIn Audit Notification – Update”
We want to make it clear that these did NOT come from LogMeIn and people should NOT click on the links in these emails.
While we have worked with our partners and successfully removed these malicious websites, as part of our commitment to security, we still want to make sure our users and the public are aware of this specific email and provide an easy way for people to identify the tell-tale signs of phishing attacks.
Email subject line: LogMeIn Audit Notification – Update
Intended behavior/action: Tries to get you to click a link to enter your LogMeIn login credentials.
Email body text is:
As with all suspicious emails, please read carefully and review the website links in these messages.
Please be sure to delete this message if you receive it. If you have clicked a link in this email, we recommend changing your password and enabling two-factor authentication on your account as well as your users’ accounts.
We also recommend taking a look at our primer on how to protect yourself against phishing attacks and ensure you’re following secure password practices.
Today, we’re excited to announce a new packaging structure is live for Central, giving our customers more freedom and flexibility to get exactly what they need out of our product. This new structure allows us to position Central as a platform and further expand as a more robust endpoint management solution with the ability to build on future modules based on our customers’ needs.
At Central, we know IT professionals wear a lot of hats, so we’re focused on ensuring our customers get the functionality they need to increase productivity, automate routine IT tasks, and optimize their resource allocation. Central’s new modules allow incoming new customers to prioritize what matters most and get the functionality they need out of their endpoint management solution.
Incoming new customers have the option to purchase our new Base package which has robust functionality and add-on one, two, or all three core functionality modules (Security, Automation, Insight) based on their needs and priorities.
To learn more, please visit: logmein.com/central
Last week, we hosted our third Central Master Class on the LogMeIn Client App & One2Many Task Management. These Master Classes are quarterly webinars that are designed to go in-depth into two features of Central to ensure that you are using Central to the best of its abilities.
In this Master Class, we covered:
- The most efficient way to install software and distribute files across multiple computers
- Our top tips for running scripts and automating manual tasks
- How to quickly connect to your remote computers without a web browser
To watch this Master Class as well as previous Master Classes, visit: https://www.logmein.com/central/resources/masterclasses
From passwords resets to corporate network threats, today’s IT teams are increasingly burdened with time-consuming tasks that keep them from more strategic work. With this in mind, we created an informative infographic to demonstrate how your passwords and endpoints might be putting you at risk – and then show you how to address these problems.
By a third-party reviewer, LogMeIn Central has been named one of the top 6 endpoint security vendors to watch in 2019. This reviewing site focuses on Endpoint Security & Protection Platforms and posts about best practices when evaluating or maintaining an endpoint solution.
The reviewer writes:
“LogMeIn provides a comprehensive endpoint management and security solution indicative of the blurring lines between identity security and the traditional endpoint perimeter. The LogMeIn Central solution security portfolio includes anti-virus, patch management, proactive alerts, software inventory, and computer health monitoring, thereby providing a comprehensive package for enterprises struggling with perimeter security gaps or visibility issues.”
To learn more, visit: https://solutionsreview.com/endpoint-security/top-6-endpoint-security-vendors-watch/
For small businesses, strong endpoint security is no longer a nice to have, but a necessity to proactively prevent threats and mitigate costs. According to the IDC, 70% of successful breaches begin at an endpoint. In addition, over the past 5 years, the number of breaches targeting small businesses has been on the rise. Small businesses need to improve their endpoint security or it is increasingly likely that they will experience a costly attack.
In honor of National Cyber-Security Awareness month, we investigated the types of endpoint breaches that are impacting small businesses and the most effective ways to proactively mitigate those threats to save costs and keep your endpoints secure.
Learn more on our website at https://www.logmein.com/central/resources/doingnothing
Every day it seems like there is another cyber-attack impacting small businesses. Per the Ponemon Institute, 61% of small businesses have experienced a cyber-attack in the past 12 months (up from 55% the previous year)1. In fact, the U.S. Securities and Exchange Commission estimates that most targeted cyber-attacks are directed at small businesses2.
As this landscape is rapidly changing and October is national cyber-security awareness month, it’s more important than ever for IT and MSP professionals to take the time to understand their vulnerabilities and to learn how to proactively protect themselves.
A key area where IT professionals can improve their ability to proactively protect themselves is against ransomware attacks. 52% of small businesses reported experiencing a ransomware attack in the past year and this number is on the rise1.
Luckily, there are tools available to IT professionals to help them proactively combat ransomware attacks. These tools focus on patching known vulnerabilities, which is an extremely effective way to stay ahead of cyber-attacks. Per Fortinet, 90% of cyber-attacks in the last year could have been avoided if people updated and patched their systems3. In addition, the research found that, of companies who experienced a cyber-attack, 60% experienced a successful attack for which a patch had been available for over a decade3.
The importance of utilizing these patch management tools is shown through the recent WannaCry cyber-attack.
WannaCry was a destructive ransomware attack that impacted more than 100 countries4. For the vulnerability that was attacked, Windows had released a patch a month prior. All the companies that fell victim to the attack had not implemented the Windows patch which left most IT departments and MSPs scrambling the days after the attack to lock-down and ensure their systems were properly patched. If these organizations had been proactive with updating their patching, they would have prevented the attack from impacting their networks and daily business operations.
With national cyber-security awareness month upon us, we should all be thinking through the best practices we should implement to improve our security and minimize our risks – and patch management is one of the best places to start.
- Ponemon Institute, ‘2017 State of Cybersecurity in Small & Medium-Sized Businesses (SMB)’, 2017.
- U.S. Securities and Exchange Commission, ‘The Need for Greater Focus on the Cybersecurity Challenges Facing Small and Midsize Businesses’, 2015.
- Fortinet, ‘Report: Dissecting Our Q2 Threat Landscape Research’, 2017.
- Smarter MSP, ‘The Most Telling Cyber-Attacks and Data Breaches of 2017’, 2017.
Based on G2 Crowd’s unbiased user reviews, LogMeIn Central has been named a leader for Endpoint Management software! G2 Crowd pulls in customer satisfaction data from real user reviews to determine each vendor’s satisfaction score and more than 15 data points from G2 Crowd’s user reviews, publicly available information, and third-party sources to determine each vendor’s market presence score.
LogMeIn Central is proud to have the following accolades highlighted:
- Leader for Endpoint Management software
- Top Momentum Leader for Endpoint Management software
- #1 Easiest To Use solution
To learn more, visit: https://www.g2crowd.com/categories/endpoint-management
G2 Crowd, a real-time and unbiased user review site empowers business buying decisions by highlighting the voice of the customer.
Their review platform leverages more than 400,000 independent and authenticated user reviews read by more than 1.5 million buyers each month. G2 Crowd’s model brings transparency to B2B buying—changing the way decisions are made.
We know IT teams wear a lot of hats and that there are numerous solutions available to enhance endpoint infrastructure security and increase productivity. Researching and selecting the right endpoint management solution can be overwhelming, so we’ve put together a practical guide for the time and resource-constrained IT professional to facilitate the search.
Download this guide to uncover:
- The critical need for comprehensive endpoint management
- 10 key questions to shape your search
- Must-have features and capabilities
- The value your solution should deliver
- How LogMeIn Central can help