Blog

Vulnerability Research

Zero-Day Alert: Email Security Platform Details

Vendor: DellProduct: SonicWALL Email Security (virtual appliance)Version: 8.3.0.6149 Summary Information:SonicWALL Email Security can be configured as a Mail Transfer Agent (MTA) or SMTP proxy and has spam protection, compliance scanning, anti-malware and anti-virus capabilities. The affected web interfaces for these vulnerabilities are frequently available on externally accessible perimeter...
Vulnerability Research

Vulnerabilities Found in the Dell EMC VMAX Management Product Family

The Digital Defense, Inc. Vulnerability Research Team (VRT) has identified six previously undisclosed security vulnerabilities found in the Dell EMC VMAX Management Product family. Summary information for these flaws can be found below.Checks for the identified vulnerabilities are available now in Frontline™ Vulnerability Manager. Clients are encouraged to run a full vulnerability assessment which...
Vulnerability Research

Zero-Day Alert: Multiple Vulnerabilities Within the EMC VMAX

Today Digital Defense is publishing six zero-day vulnerabilities found in the Dell EMC VMAX Management Product family that our vulnerability research team discovered and brought to the attention of Dell EMC. Dell EMC has been extremely professional and worked diligently with Digital Defense engineering staff to understand, resolve and verify the fixes for these security issues.Dell EMC has...
Blog

Eight Ways to Avoid Becoming Phish Bait

Is your organization capable of defending against today’s phishing attacks? Social Engineering requires very little to no knowledge of information technology or cutting-edge applications. All an attacker needs is a target and a crafty email to prey on weaknesses in human behavior.Don’t Take the Bait! Tips to Help Defend Against a Phishing AttackBe suspicious of emails asking you to “verify” your...
Blog

Veritas InfoScale Operations Manager Vulnerabilities

Today, Fortra is publishing two zero-day vulnerabilities found in the Veritas InfoScale Operations Manager that our vulnerability research team discovered and brought to the attention of Veritas. Veritas has been extremely professional and worked diligently with Digital Defense engineering staff to understand, resolve and verify the fixes for these security issues.Veritas has released fixes for...
Blog

IT Risk Mitigation

It's a brave new world for IT. And it often seems impossible to predict future demand and guard against performance risks. You have mountains of data, scalable cloud infrastructures, and a complex web of IT environments. It's complicated, to say the least. And it's matched by skyrocketing consumer demand for and reliance on online services. Bottom line: outages are more dangerous to a company...
Blog

Do You Need Enterprise Scheduling Software?

Job scheduling was simpler when you only needed to worry about your IBM i (AS400) server and its batch processes, but several dynamics have changed over the past decade which have forced us into worrying about processes on other platforms.
Blog

Big Data? BIG DEAL!

With the dawn of the big data era upon us, what can IBM i systems administrators expect in terms of the demands that will be placed upon them and what kind of resources will be required to cope? Find out what the managed services industry can teach us today about what the future holds for us tomorrow.
Blog

Is Your Boss an Automation Skeptic?

There is little doubt among IT experts as to the potential benefits of implementing automation tools at deeper levels within the data center environment. Yet adoption rates have not always mirrored this optimism. Especially among the small business crowd, automation is still seen as something that is "nice to have" as opposed to mission-critical.
Blog

Modern RMM Tools for MSPs

Where managed services providers once delivered self-service and after-hours support for beleaguered IT teams, most have now evolved to offer remote monitoring and hosting. But has their technology been keeping pace?