dcsimg

Podcast: Log Management Basics – What should You Collect?

Log Management is a hot topic these days, especially in the way it pertains to organizational data security. So in this episode of Defrag This, your host Mark Towler sits down with Jim Cashman to quiz the latter on his sysadmin experience with Log Management. … [Read more...]

Defend Your Digital Assets Against Cyberattacks: 5 Log Management Best Practices

Every device, OS and application in your IT environment generates a record of activities in the form of log files. These audit trails of activity provide valuable information when investigating security breaches and when submitting regulation compliance reports. … [Read more...]

“Are You Sure That Went Through?” Viewing File Transfers in Real-Time

In a perfect world your file transfer solution would flawlessly complete every single file transfer quickly, completely and without delay. Unfortunately, we don’t live in a perfect world and a multitude of factors can delay or prevent your scheduled file transfers. … [Read more...]

Enforcing Security Policy Agreement at Sign On with MOVEit

It’s a given that users with access to your MFT solution have permission to use it and know exactly what they are allowed to do with it. But maybe it shouldn’t be. … [Read more...]

Manage Virtual Machines On-Premises and in the Public Cloud

Virtualization is becoming more and more popular among IT communities, and with good reason. But that popularity will require a greater level of vigilance as well. … [Read more...]

Primed for Failure — How to Avoid Amazon’s Mistakes

Amazon’s heavily-promoted Prime Day event started off with Amazon falling flat on its face right out of the gate. Their site was non-responsive for hours with would-be shoppers getting served pictures of dogs instead of the amazing deals they were promised. Real-time web status service downdetector.com shows an astonishing 24,278 failure reports right after launch. … [Read more...]