Case Study
Large Health System Turns to Core Privileged Access Manager (BoKS) for Server Management & System Security
A leading not-for-profit health system in the United States, with multiple hospitals, rehabilitation centers, physician clinics, mental health facilities, independent living centers, and home health agencies, employs more than 9,000 individuals, including nearly 1,400 physicians. Collectively, the entities within the healthcare organization also maintain more than 1,500 licensed beds across the...
Case Study
Leading Global Manufacturing Company Streamlines Administration with Centralized Privileged User Management
Ability to automate ‘what and which’ authentication methods are utilized based on the access request also significantly improves administrator productivity.
Case Study
Top 5 Worldwide Bank Uses Core Privileged Access Manager (BoKS) for Privileged Access Management
Ensuring security and privacy are central to the continued success for one of the largest bank holding company in the United States. With over 13 million individuals and business customers, this full-service banking, brokerage, and investment company understands the importance of protecting customer information.
...
Article
With Public Cloud OS Instances Growing, Security Challenges Grow, Too
Tue, 03/13/2018
“Some cloud vendors tout that systems deployed within their framework require little or no administration: You create an image with the software and applications that you want it to provide services for, spin it up in a management console, and Voila! you have an entirely new system online; with minimal cost, no hassle, little work. However, even...
Article
Perspectives on the Changing Linux Ecosystem
Tue, 03/13/2018
Media
Text
In the early 1990s the Open Software Foundation formed a committee to select and standardize a new Management Platform Toolset for and from the UNIX ecosystem. After much...
Article
Why Choose Intermapper as a Network Mapping Tool
By Kevin Jackson on Fri, 10/13/2017
Intermapper creates some of the best dynamic visual maps out there, while still giving you monitoring and alerting in one easy-to-use network mapping tool.
Article
How to Get Your BI Project Approved
Fri, 09/22/2017
Your organization needs business intelligence. But how will you sell upper management on your BI project?
Article
What Really Matters in IBM i Monitoring?
By Paul Ratchford on Thu, 09/14/2017
Guard against degraded system performance, data loss, and downtime. Make sure you’re monitoring these 15 metrics on the IBM i operating system.
Case Study
How Peoples Telephone Reboots Equipment Instantly with Network Monitoring & Automation
What if you could reduce an eight-hour outage… to no time at all?
That’s exactly what Peoples Telephone Cooperative did. Faced with sudden equipment failures, they started monitoring their network… then went one step further to automatically fix the outages. Now this savvy telecommunications service provider saves countless man hours, makes sure technicians get a full night’s sleep every night,...
Article
On-Premises vs. Cloud Network Monitoring: Which is Right for You?
By Kevin Jackson on Tue, 08/22/2017
If you’re trying to decide between on-premises and cloud network monitoring solutions, here are some thoughts to consider from the experts.
Article
Intermapper vs. PRTG: What’s the Difference?
By Kevin Jackson on Fri, 07/14/2017
Find out how Intermapper and PRTG are similar, how they differ, and how to decide which one is the right choice for you.
Article
6 Enhancements in IBM i Server Suites Version 7
By Paul Ratchford on Fri, 06/23/2017
What's new in version 7 of IBM i Server Suites? Read this article to find out.
Article
Intermapper Overview: Quick Feature Videos
By Kevin Jackson on Mon, 06/12/2017
Need a quick introduction to what Intermapper can do? These short videos will walk you through what Intermapper is, how to create maps, automating tasks with Intermapper, and more.
Article
Intermapper vs. NetBrain: How Do They Stack Up?
By Kevin Jackson on Fri, 05/26/2017
You’ll find multiple tools that do network mapping, monitoring, and automation. Intermapper and NetBrain are two of them. Find out what they do and how to choose the right one for you.
Article
Monitor Your Wireless Network Equipment with Intermapper
By Kevin Jackson on Fri, 05/12/2017
Monitor wireless access points, backhauls, routers, and more with Intermapper. Real-time visibility into your device statuses helps you maintain reliable connectivity at all times.
Article
Use Conditional Logic in Sequel Data Access to Convert Data into Meaningful Information
By Mike Stegeman on Thu, 03/30/2017
Let’s face it, the amount of data that we have is only continuing to grow, which will become harder to manage and understand. Per IDC Research, 90 percent of data in the world today was created in the last two years, and in 2016, we entered the zettabyte era.
A huge challenge for everyone is finding the best way to convert all their data into meaningful information. But that can be tricky.
If...
Article
Identifying Security Threats with Network Monitoring Software
By Kevin Jackson on Thu, 03/23/2017
Now more than ever, securing your infrastructure is critical to the success of your organization.
Article
Sudo or SuDon't: Manage Your Privileged Command Execution and Sudo Policies
Mon, 03/13/2017
System admins need root level authority at all times, system operations staff needs periodic database and application account authority, and security admins needing to protect the environment are some of the few of the challenges of managing privilege in the enterprise server infrastructure. Read this article to learn more about Sudo alternatives.