The most recent content from our members.
Do you know how to protect your organization's sensitive data from today’s cyberthreats? One way is to arm the enterprise with a security information and event management (SIEM) tool. SIEM solutions provide a meaningful contribution to defense-in-depth strategies with their ability to detect, defend against, and conduct…
So, I wanted to at least touch base with everyone on the “scandal” of the week. Is it fake news? New ways for stock gouging? New ransom type embankments? Corporate espionage? I waited until at least some of the dust had settled to write this post. I wanted to be able to make accurate judgment calls and present a…
Over the last decade, cybercriminals have gained the necessary resources to make it easier and more lucrative for them to attack small-to-medium-sized businesses. The 2019 Cost of a Data Breach Report not only shows the odds of experiencing a data breach have gone up by a third in less than a decade, but the cost of these…
Omar Rafik, SolarWinds Senior Manager, Federal Sales Engineering Here’s an interesting article by my colleague Jim Hansen about the benefits and challenges of edge computing. Ultimately, this new technology requires scrutiny and planning. Edge computing is here to stay and it’s no wonder. Edge computing provides federal IT…
I know what you’re thinking… why “kung fu?” and “What does martial arts have to do with IT security and how I protect my network?” Well, kung fu is a Chinese term referring to any study, learning, or practice that requires patience, energy, hard work, discipline, and time to complete. So, really, it’s not just martial…
Hi, I'm new on platform and tried to get some kind of idea on what goes where. Couldn't figure out so I just used new post -button to see how things work. I'm currently evaluating N-Central as a ground-solution for my endpoints (100+ device environment) I tried to do some searching on if there is a way to data out from…
Today, in the fifth post of this six-part series, we’re going to cover the fourth and final domain of our reference model for IT infrastructure security. Not only is this the last domain in the model, it is one of the most exciting. As IT professionals, we are all being asked to do more with less. This is why we need…
i have reviewed the minimum requirements for NTM in the Install and Admin. Guides. What I need is real world Best Practice system requirements for using NTM and taking the maps and importing them into a separate Orion server. CPU 1- 2 Speed: RAM: C: Drive: Data Drive: NIC’s: Will accept URL, Blog etc. Large Global Network…
With a 24-hour news cycle, we are constantly bombarded with headlines detailing the latest data breach, malware infection, email phishing scam, or high-profile compliance violation. Although the source of these incidents often varies, the consequences for businesses of all sizes remain relatively the same: hefty fines,…
It looks like you're new here. Sign in or register to get started.