The most recent content from our members.
Protecting your network from rogue devices just got real with the new User Device Tracker 3.0. With the latest release of UDT, you’re in control of who and what connects to your network. It’s like having your very own SWAT team at your fingertips. No longer does your network have to be at the mercy of unknown or unsafe…
Are You Prepared for the Future of IP Address Management? Join us to learn how to plan ahead and get 250 thwack points! The increasing number of IP addresses coupled with the growing number of personal devices connecting to your network is changing the state of IP address management. Register for our "Managing the…
The evolution in mobile technology has changed the way we work. Gone are the days when work was only done on personal computers. Even laptops have slowly paved way to trendy mobile phones and tablets. With a new and sophisticated device hitting the market on a daily basis with better technological supremacy, employees are…
A rogue access point (AP) is a wireless access point that has gained access into secure enterprise network without explicit authorization from the network administration team. These unauthorized rogue access points open wireless backdoors into wired networks. There could be numerous unauthorized APs in and around the…
The Internet of Things (IoT) offers the promise of a more connected and efficient military, but Defense Department IT professionals are having a hard time turning that promise into reality. They’re deterred by the increasing demands and security vulnerabilities of more connected devices. That hasn’t stopped defense…
By Joe Kim, SolarWinds EVP, Engineering and Global CTO Bring your own application (BYOA), virtual desktop infrastructure (VDI) and software-defined networking (SDN) may promise great things, but they also expose network vulnerabilities. For military IT professionals, the network is the first line of defense against these…
To help protect and safely resolve high-risk situations on the network, organizations need SWAT force power—the kind found in the new SolarWinds User Device Tracker (UDT). The latest version of User Device Tracker incorporates powerful new features to help you take an even more proactive stance in controlling who and what…
Unidentified devices on your network could be any device that intentionally or unintentionally attempts to breach sensitive company information or resources. The biggest risk posed by unidentified devices is that by the time they are detected and a breach has been discovered, it is possible that attackers have already…
Network access security is a must for all network admins and we always spend a lot of time granting and managing device access permissions on the network. Network access security necessitates that you need to ensure only authorized people can connect to your network ports to avoid network break-in from rogue devices.…
Most network admins might have faced a “finding Waldo” situation – where Waldo is an unknown device that sometimes appears in your reports or logs: in your ‘ACL Deny’ logs as using non-business applications, in your NetFlow report as a bandwidth hog, as a problematic server in the cluster, as an unapproved NAS device in…
It looks like you're new here. Sign in or register to get started.