The most recent content from our members.
Keeping your IT infrastructure safe is a full-time job and requires a collaborative effort. Threat management can be defined as “the potential for a threat source to exercise (accidentally trigger or intentionally exploit) a specific vulnerability.” This threat can come from within your organization, possibly a disgruntled…
The previous article on SANS Security Survey 2013 discussed about the security needs and challenges in enterprises to detect threats and the complexity to respond to breaches and attacks, etc. Further to detecting threats and responding to them, we got some insights on the kind of data used by organizations for security…
I recently had the opportunity to interview Cole Lavallee of Waters Corporation. At Waters, Cole and his team use Server & Application Monitor, Log & Event Manager and DameWare to monitor and troubleshoot hundreds of servers, critical applications, and sites worldwide to reduce any downtime and increase customer…
SECURITY FOLKS, GET READY FOR THE WEBCAST!! Why is this important to you? In recent years, you would have heard about the loss of sensitive information through USB drives and other mass storage devices that make it easier than ever for data to walk out the door, that too when the usage of thumb drives at workplaces are…
Have questions about your products? Want to know what we're working on or when your favorite feature is going to be implemented? Join us for the Customer Event at Cisco Live for short presentations, lots of Q&A, and a catered lunch. Presentations will be brief to allow plenty of time to chat with SolarWinds staff about…
Many network and systems monitoring tools these days offer both client-based and agentless options to monitor managed clients, such as servers and workstations. The question in these cases is, "Which do I pick?" There are pros and cons to both options, and which one you pick has everything to do with how you weigh these…
Ready to take your mapping skills to a whole new level? You learned a lot from the Admin guide and thwack, and now, this episode will take your mapping skills to a whole new level. In this episode, get step by step demos of: * * How to Add & Embed a Sub-Map * Create Maps for Specific Users/Permissions * Why You’ll Want to…
There is no doubt that we live in a high-tech world where everything is constantly getting faster. If you're over 40, like me (sigh), you may remember a time before emails. There was a time when people actually wrote by hand and mailed letters to one another to communicate. It was a romantic and personal way to…
The week of Mobile Security!! Do you know how mobile devices affect your network security? The boundary of enterprise security doesn't end with your organization’s perimeter. You might have improved your defense mechanism against direct attacks on your network, but mobile devices can still be a potential threat, unless the…
Alright Security folks, WEBCAST TIME!! What is this all about? This webcast will discuss and showcase how various organizations are dealing with IT security. You will get to know whether these organizations are implementing tools and techniques to deal with their security data analytics problems, are they automating…
It looks like you're new here. Sign in or register to get started.