The most recent content from our members.
Request to use a certificate thumbprint for scheduled reports when SSL is enabled. Background: We use scheduled reports, but we recently enabled SSL which broke the process. The exporttopdfcmd.exe, which runs the reports, currently uses a file path to the certificate which allows the scheduled reports to work with SSL…
Now that ARM 2025.2 is generally available, we are busy working on the next release. In ARM 2025.2, we delivered on completing feature parity for AD functions between the rich client and the web client (except for AD Alerts), ensuring a consistent experience across both clients. Here’s what we’ll focus on in upcoming…
We’re pleased to announce the latest version of SolarWinds® Access Rights Manager (ARM) - version 2023.2. The features and updates continue to help you provide simplified self-service permission management with audit capabilities to support and execute your organization’s compliance needs. Access the latest version of ARM…
Make plans to attend our next SolarWinds Day event on June 28 as we explore the importance of public/private partnerships to secure our common cyberinfrastructure. SolarWinds Chief Information Security Officer and VP of Security Tim Brown—who was recently named CISO of the Year in the Globee® Cybersecurity Awards—will host…
We are delighted to see a large number of you who have signed up for our SolarWinds Day event taking place today, 10.00 A.M. CST. If you have not registered yet, there is still time! Hosted by SolarWinds CISO and VP of Security Tim Brown, this event includes a bipartisan panel of government leaders discussing the United…
As a society, so much of everything we do these days revolves around trusted and safe technology designed to make our lives easier and more efficient. The attacks against SolarWinds and numerous other companies in recent months have revealed malicious cyber actors increasingly look to take advantage of our digital…
Healthcare organizations have long been attractive targets for both external cyber attacks and insider threats. These organizations hold a large amount of confidential personal and financial data, putting them at serious risk if breached. Join our webcast to find out how to address these challenges and protect against them…
Zero trust is a security model based on the principle of maintaining strict access controls and not trusting anyone by default, even those already inside the network perimeter. There are several steps needed to properly evaluate your organization’s current state and start implementing best practices, which can seem…
Join host Sean Sebring as he talks to SolarWinds CISO Tim Brown about the 2023 threat landscape after an unprecedented number of cyberattacks. You’re going to want to buckle up, type in the code, scan your retinas, say Beetlejuice three times, and download this episode.…
Lesley Carhart is recognized as one of the leading voices in digital forensics and cybersecurity. But her career began – and is still firmly rooted – with her service in the Guard and Reserves. She devotes a significant amount of time to helping others make the transition into tech, both within the armed services and as…
It looks like you're new here. Sign in or register to get started.