Blog
Equifax’s Problem and How to Avoid It
Mon, 10/09/2017
Recently, the cause of Equifax’s catastrophic cyber attack was revealed as a hack that exploited a known bug in in Equifax’s web application software, Apache Struts.Since then, the discourse surrounding the event has shifted to two main subjects:The blame game: people want to hold someone responsible. The fallout has claimed the jobs of Equifax’s CSO, CIO, and now, CEO.The preventability of the...
Blog
Network Mapping Software: Paid vs. Free - Which is Best?
By Kevin Jackson on Tue, 10/03/2017
Network mapping software give you visibility into network connections, performance issues, and unusual traffic spikes but what is the right tool for you: paid or free?
Blog
How to Get Started with NIST 800-171 Compliance
By Kevin Jackson on Fri, 09/22/2017
Are you ready to report your NIST 800-171 compliance status by the end of the year? If you do business with the federal government, you need to comply with SP NIST 800-171 by the end of the year. Now is the time to implement your compliance plan.
Blog
The Benefits of a Self-Healing Network
By Kevin Jackson on Tue, 08/29/2017
Self-healing networks can make your life easier, save you time (and your organization money), and help eliminate downtime through real-time monitoring and automation.
Blog
Network Monitoring Freeware: Advantages and Disadvantages
By Kevin Jackson on Mon, 08/14/2017
Trying to find a qualify freeware network monitoring product? You'll come across three types of free tools in your searches. Make the right choice by considering the pros and cons of each.
Blog
Five Causes of Performance Bottlenecks in IT
Wed, 08/09/2017
As IT infrastructures continue to grow more complex, finding performance bottlenecks gets hard. That’s why it’s absolutely essential that IT teams have the tools, training, and resources necessary to quickly identify causes of poor application performance.
Blog
Network Monitoring Tips for Hybrid IT Environments
By Kevin Jackson on Wed, 07/26/2017
Hybrid IT allows organizations to experiment with the cloud while keeping any equipment or applications on-premises as it makes sense. If you’re the one responsible for day-to-day monitoring, here’s what you need to know to manage the complexity.
Vulnerability Research
Critical Vulnerability Found in Avaya AES Management Console
Wed, 06/21/2017
Vulnerability Identified in the Avaya AES Management Console PlatformToday Digital Defense is publishing a high impact zero-day vulnerability identified in the Avaya Application Enablement Services (AES) Management Console platform discovered by Digital Defense Security Analysts. The Digital Defense Vulnerability Research Team would like to commend Avaya for their prompt handling and diligent...
Blog
Why Dynamic Network Mapping Always Beats Microsoft Visio
By Kevin Jackson on Fri, 06/16/2017
As IT environments grow in size and complexity, keeping an eye on performance has never been more vital. Here are five reasons why dynamic network mapping software is the best tool for the job.
Blog
10 Essential Tips for Securing FTP and SFTP Servers
Mon, 05/01/2017
Most organizations use FTP or SFTP servers to exchange files and other critical business documents with their trading partners. Unfortunately, these servers have become a primary target for hackers. Learn SFTP security best practices in this blog and webinar.
Blog
Zero-Day Alert: Four Vulnerabilities Discovered in Riverbed Technology Performance Monitoring Platform Discovered by Digital Defense, Inc.
Mon, 04/10/2017
Digital Defense is publishing multiple application vulnerabilities in the Riverbed SteelCentral portal application today following the client notification by Riverbed Technology. Digital Defense’s Vulnerability Research Team identified the security issues through vulnerability scanning, and brought the flaws to the attention of Riverbed Technology in January 2017 following discovery. Riverbed...
Blog
Network Monitoring Software for Windows: 6 Must-Have Features
By Kevin Jackson on Mon, 04/03/2017
Choose a Windows network monitoring tool that is easy to install, user-friendly, and flexible.
Blog
Speedy Network Remediation with Intermapper and Automate
By Kevin Jackson on Thu, 03/30/2017
Learn how to cut your remediation time from hours to minutes thanks to a seamless interface between two Fortra products, Intermapper and Automate.
Blog
The Top 11 Network Automation Examples
By Kevin Jackson on Mon, 03/27/2017
As your network grows in size and complexity, automation can free up network administrators from repetitive, manual tasks to focus on more strategic, fulfilling projects.
Blog
How to Choose a Capacity Planning Tool
By Per Bauer on Tue, 02/28/2017
Looking for a capacity planning tool? Find out how to choose a tool that will be the most accurate.
Blog
Network Topology Mapper: What Is It and Why Does IT Need One?
By Kevin Jackson on Thu, 02/23/2017
Learn how a network topology mapper can simplify and speed up troubleshooting for IT teams.
Blog
Network Mapping Best Practices: Four Steps for Success
Wed, 02/22/2017
The process of manual network mapping can be a difficult task. Streamling the process with an industry-leading network mapping solution like Intermapper.
Blog
How Flexible Alerting Helps Proactive Network Management
By Kevin Jackson on Wed, 02/22/2017
Flexible alerting and notification features can help you take a proactive approach to network management by keeping you one step ahead of errors and outages.