The most recent content from our members.
When last we talked, we visited about why UX testing at SolarWinds is such a vital component to the way we do business. In short, we believe if users are happy and successful with our products, then we as a company will also be happy and successful. Today, I wanted to share two concrete examples of how our products changed…
As we move into the New Year, it is time for us to have a look at some threats that we need to be guarded against. In this blog post, let us look at how Ransomware is likely to become more sophisticated in 2014. Here are a few trends observed this year that may well continue well into 2014, with some new and interesting…
What’s in a log file? The very purpose of IT security is to be proactive make it difficult for someone who attempts to compromise your network. You also need to be able to detect the actual breaches as they are being attempted. This is where log data really helps. Collecting and analyzing logs, help you can understand what…
Readers’ choice awards are the best kinds of awards to win. They take all of the suspicion out of the process, and just focus on the thing that matters the most: the users’ experience. That’s why we are so flattered that SolarWinds Log & Event Manager recently won the Readers’ Choice GOLD Award for the Best of SIEM 2012…
In the earlier blogs of this series, we saw the snapshot of the SANS security survey showing how prepared organizations are in the methos of threat detection and response, and generating security reports. Now, we’ll see how organizations are equipped to collect security data and correlate that for threat intelligence. A…
Last week we co-hosted a webcast presented by Randy Franklin Smith of ultimatewindowssecurity.com entitled "Auditing SharePoint Activity for Compliance and Security". For those of you who haven’t thought about it, protecting information by constantly monitoring logs and event data has been the primary course of action to…
If you rely on a Huawei router or firewall configuration, you can use Kiwi Syslog Server to monitor and archive network activity. Read on to learn how. What is Syslog Again? Syslog is a standard used to log and route messages like router connection messages and firewall warnings in an IP network. The syslog standard…
None of us are really normal. But when our tools make the things in our professional lives "normal," they make things a whole lot easier. What I'm talking about is a process commonly know as normalization. Normalization is the way in which a software program takes information from a variety of sources and translates it…
In conjunction with SANS, SolarWinds recently conducted a security survey amongst 647 respondents who are security and network administration professionals from various public and private organizations including federal government agencies, banking, financial, and healthcare institutions across the US and Canada. The…
What happens when a user locks out his user account? He calls you, right? Well, something else happens, too: your domain controller logs the event. The neat thing about that is it's not just good for compliance reporting. Logged events like this are also useful for log management systems that monitor your logs and notify…
It looks like you're new here. Sign in or register to get started.