Blog
Effective Change Management: How to Prepare For Network Changes
By Kevin Jackson on Wed, 11/30/2016
With any change to the network infrastructure, you must maintain the ability to oversee and monitor the state of the network. Learn how a network monitoring tool like Intermapper can help you prepare for future network changes.
Blog
Achieving SLAs and Documenting Performance with Reports
By Kevin Jackson on Mon, 11/21/2016
With network monitoring capabilities, an organization can easily measure the performance they receive from their service provider and compare these statistics against the checkpoints included in the SLA.
Blog
How Much Should I Budget For Network Monitoring Software?
By Kevin Jackson on Tue, 10/25/2016
Create a realistic budget item for a network monitoring solution that will meet your needs (and won’t eat up all your IT funds).
Vulnerability Research
Zero Day Threats Found in Enterprise Application
Tue, 10/18/2016
Two zero-day vulnerabilities found in the Lexmark Markvision Enterprise application that our Vulnerability Research Team discovered and brought to the attention of Lexmark. Lexmark has worked diligently with Fortra to understand, resolve and verify the fixes for these security issues. Lexmark has released fixes. To obtain Markvision Enterprise v2.4.1 visit: https://www.lexmark.com/markvision...
Vulnerability Research
Zero-Day Alert: Email Security Platform Details
Tue, 10/11/2016
Vendor: DellProduct: SonicWALL Email Security (virtual appliance)Version: 8.3.0.6149
Summary Information:SonicWALL Email Security can be configured as a Mail Transfer Agent (MTA) or SMTP proxy and has spam protection, compliance scanning, anti-malware and anti-virus capabilities. The affected web interfaces for these vulnerabilities are frequently available on externally accessible perimeter...
Vulnerability Research
Vulnerabilities Found in the Dell EMC VMAX Management Product Family
Mon, 10/03/2016
The Digital Defense, Inc. Vulnerability Research Team (VRT) has identified six previously undisclosed security vulnerabilities found in the Dell EMC VMAX Management Product family. Summary information for these flaws can be found below.Checks for the identified vulnerabilities are available now in Frontline™ Vulnerability Manager. Clients are encouraged to run a full vulnerability assessment which...
Vulnerability Research
Zero-Day Alert: Multiple Vulnerabilities Within the EMC VMAX
Mon, 10/03/2016
Today Digital Defense is publishing six zero-day vulnerabilities found in the Dell EMC VMAX Management Product family that our vulnerability research team discovered and brought to the attention of Dell EMC. Dell EMC has been extremely professional and worked diligently with Digital Defense engineering staff to understand, resolve and verify the fixes for these security issues.Dell EMC has...
Blog
Eight Ways to Avoid Becoming Phish Bait
Tue, 09/20/2016
Is your organization capable of defending against today’s phishing attacks? Social Engineering requires very little to no knowledge of information technology or cutting-edge applications. All an attacker needs is a target and a crafty email to prey on weaknesses in human behavior.Don’t Take the Bait! Tips to Help Defend Against a Phishing AttackBe suspicious of emails asking you to “verify” your...
Blog
Veritas InfoScale Operations Manager Vulnerabilities
Wed, 09/07/2016
Today, Fortra is publishing two zero-day vulnerabilities found in the Veritas InfoScale Operations Manager that our vulnerability research team discovered and brought to the attention of Veritas. Veritas has been extremely professional and worked diligently with Digital Defense engineering staff to understand, resolve and verify the fixes for these security issues.Veritas has released fixes for...
Blog
IT Risk Mitigation
By Per Bauer on Thu, 09/01/2016
It's a brave new world for IT. And it often seems impossible to predict future demand and guard against performance risks.
You have mountains of data, scalable cloud infrastructures, and a complex web of IT environments. It's complicated, to say the least.
And it's matched by skyrocketing consumer demand for and reliance on online services.
Bottom line: outages are more dangerous to a company...
Blog
5 Steps to Streamline Your Network Monitoring Process
By Kevin Jackson on Fri, 08/19/2016
Learn five ways to maximize the efficiency of your network monitoring solution and streamline its implementation to make sure it's keeping your network as healthy as possible.
Blog
The Impact of IPv6 on Network Management
By Kevin Jackson on Fri, 08/19/2016
With the unstoppable growth of IP-enabled devices, the move to IPv6 has been on the minds of network administators for years. Learn how to prepare for the future with the right software in place.
Blog
Learning Cyber Defense Strategies from Stratego Strategy
Thu, 08/11/2016
I grew up in an environment filled with fun and engaging games. My parents, who were Grand Life Masters in the game of Bridge, believed their children could “learn to think” by playing and facing challenges presented by different strategy games. Growing up my family played many hours of strategy games such as Chess, Risk, Bridge, and many others. One of my favorite games was Stratego. As CTO of an...
Blog
11 Things To Know About IPv6 Transitions
By Kevin Jackson on Mon, 08/01/2016
Benefit from the collective wisdom we’ve complied from IT professionals and learn a thing or two (or 11) about IPv6 transitions.
Blog
Vulnerability Research Team Shares Details Regarding Recent Zero-Day Discoveries
Wed, 07/20/2016
Today Fortra is publishing several high-impact vulnerabilities on the Dell SonicWall GMS platform that our vulnerability research team discovered and brought to the attention of Dell. Dell has been extremely professional and worked diligently with Fortra engineering staff to understand, resolve and verify the fixes for these security issues. Dell has released fixes and customer advisories for...
Blog
What Is Queuing Theory?
Mon, 02/15/2016
Queuing theory is the study of queues, otherwise known as waiting lines. It sounds straightforward. But unless you have an advanced math degree, queuing theory can be difficult to understand. That’s why we’re clarifying queuing theory basics.
Vulnerability Research
Finding the Solarwinds Flaw
Tue, 11/24/2015
Several months back I was updating our vulnerability scanner checks for various Solarwinds products. As I added a detection script for a product called Log and Event Manager (LEM), I realized that there were really no significant publicly disclosed vulnerabilities for it. This spurred me to download their trial, which comes as a virtual appliance, and look for some flaws.
After initially setting...
Vulnerability Research
DDIVRT-2015-55 SolarWinds Log and Event Manager Remote Command Execution
Tue, 10/27/2015
Title: DDIVRT-2015-55 SolarWinds Log and Event Manager Remote Command ExecutionSeverity: HighDate Discovered: August 15, 2015Discovered By: Chris Graham @cgrahamsevenVulnerability Description:SolarWinds Log and Event Manager (LEM) is vulnerable to an Extensible Markup Language (XML) external entity injection through the agent message processing service. This service listens on TCP port 37891....