dcsimg

The Capital One Data Breach: Who’s in Your Wallet?

Recently, we learned about the latest data breach where 106 million Capital One customers in the USA and Canada had personal details stolen. … [Read more...]

Now You Can Integrate WhatsUp Gold with Anything

WhatsUp Gold can monitor every single part of your network to give you a wealth of information on status, performance, traffic and thousands of other metrics. And now WhatsUp Gold can share that information directly with any of your systems thanks to our new REST API. … [Read more...]

Facebook Too Big For Compliance: Are Record Fines Ineffective?

Do the latest fines against Facebook matter or is Facebook going to continue with business as usual? … [Read more...]

The Four Key Features of Cloud MFT

If you’re planning on taking advantage of a Software-as-Service MFT solution you need to consider several key features to ensure you’re getting something that will meet all your requirements. … [Read more...]

Three Benefits of Cloud Managed File Transfer

MFT solutions are now also available as cloud-based Software-as-a-Service (SaaS) offerings which can provide a number of benefits over traditional on-premise MFT offerings. Generally this means you’re getting all the capabilities of a full-featured MFT solution without having to deal with the hassles of managing and maintaining it on your own site.  … [Read more...]

Announcing the New more-usable MOVEit 2019

We're excited to announce the latest version of our managed file transfer (MFT) solution, MOVEit 2019! We’ve included a bunch of new features that make it easier to use, provide more flexible security options and make scaling to cloud services like Microsoft Azure simpler. The result is a more usable managed file transfer that makes onboarding, scaling and integration easier than ever … [Read more...]

Podcast: Log Management Basics – What should You Collect?

Log Management is a hot topic these days, especially in the way it pertains to organizational data security. So in this episode of Defrag This, your host Mark Towler sits down with Jim Cashman to quiz the latter on his sysadmin experience with Log Management. … [Read more...]

Defend Your Digital Assets Against Cyberattacks: 5 Log Management Best Practices

Every device, OS and application in your IT environment generates a record of activities in the form of log files. These audit trails of activity provide valuable information when investigating security breaches and when submitting regulation compliance reports. … [Read more...]

“Are You Sure That Went Through?” Viewing File Transfers in Real-Time

In a perfect world your file transfer solution would flawlessly complete every single file transfer quickly, completely and without delay. Unfortunately, we don’t live in a perfect world and a multitude of factors can delay or prevent your scheduled file transfers. … [Read more...]

Enforcing Security Policy Agreement at Sign On with MOVEit

Security policies are prone to change, and you need to keep your users up-to-date on those changes so that they won't violate the terms of the policy, but doing so is often easier said than done.   … [Read more...]