Resources

Article

How To Maintain Your Data Integrity

File Integrity Monitoring (FIM) helps ensure that your critical and sensitive data is viewed and changed only by authorized personnel through approved channels. Candidates for FIM include application files containing sensitive data, such as personnel or financial data, and server configuration files.
Article

The Modern Alternative to Authority Adoption

There are several considerations with authority adoption. Each is important but can usually be accommodated. But what is the effect if the program owner has the same or less privileges than the user that called the program?
Article

Stay on Top of Security with Security Scan

Security and compliance adherence has elevated in criticality over the past few years and has now taken its rightful place as a primary IT initiative, alongside virtualization and disaster preparedness. The necessity for better data protection has landed front-and-center in the public eye following some of the largest data breaches on record.
Article

The Road To Security Starts with a Security Scan

Sometimes, there are known vulnerabilities that clearly need to be mitigated as soon as possible—such as application users running with *ALLOBJ special authority. But, often there isn’t a thorough understanding of what’s wrong with a server’s configuration or what should be addressed first.
Article

What Can Intermapper Monitor?

What can Intermapper monitor? Just about anything. Learn how to monitor any device with an IP address, making your network visibility as comprehensive as possible.