Case Study
Top 5 Worldwide Bank Uses Core Privileged Access Manager (BoKS) for Privileged Access Management
Ensuring security and privacy are central to the continued success for one of the largest bank holding company in the United States. With over 13 million individuals and business customers, this full-service banking, brokerage, and investment company understands the importance of protecting customer information.
...
Article
Perspectives on the Changing Linux Ecosystem
Tue, 03/13/2018
Media
Text
In the early 1990s the Open Software Foundation formed a committee to select and standardize a new Management Platform Toolset for and from the UNIX ecosystem. After much...
Guide
Getting Started with Intermapper Flows
This quick 4-minute video and guide walks you through how to install and set up Intermapper Flows for powerful bandwidth monitoring and network traffic analysis.
Datasheet
Intermapper Flows
Intermapper Flows is a tightly integrated component of Intermapper’s network monitoring, mapping, and alerting suite of tools.
Blog
How to Get Started with NIST 800-171 Compliance
By Kevin Jackson on Fri, 09/22/2017
Are you ready to report your NIST 800-171 compliance status by the end of the year? If you do business with the federal government, you need to comply with SP NIST 800-171 by the end of the year. Now is the time to implement your compliance plan.
Blog
Performance Management
By Per Bauer on Sat, 07/22/2017
What is Performance Management?
IT performance management is responsible for everyday aspects of capacity management, like monitoring performance and resources, planning changes to make efficient use of resources, analyzing performance, and reporting back to the business.
Now more than ever, your company’s bottom line rests on your ability to provide 24/7 service...
Blog
IT Maturity
By Per Bauer on Fri, 06/16/2017
What are your optimization goals?
An optimization initiative is typically triggered by one of the drivers listed below and the focus is dictated by your overall business objectives. But singlehandedly focusing on one objective may negatively impact your capabilities in the other areas. This can reduce the overall service quality and offer limited to no real value. In order to achieve concurrent...
Guide
6 Ways to Calculate Returns from your Network Monitoring Investment
How do you calculate the return on investment (ROI) of a network monitoring software? Learn the problems a network monitoring solution can solve and how to easily calculate its ROI.
Blog
How to Go from Simple to Strategic Capacity Management
By Per Bauer on Fri, 03/17/2017
Capacity Management Strategies
If IT was like a restaurant…then capacity management should be like the restaurant manager (aka Maître D’).
Unfortunately, too many organizations are using capacity management as the clean-up department. When something goes wrong, capacity management fixes it. And while that used to work, that’s not the best practice...
Blog
Capacity Planning
By Per Bauer on Tue, 03/14/2017
Have you ever experienced an online service outage? It’s like losing half your physical locations without any warning.
Downtime is a huge problem. It stops your revenue stream. It compromises customer loyalty. It damages your brand’s reputation. And it wastes hours and IT resources to fix the problem—when it shouldn’t have been a problem to begin with.
Isn’t it about time you prevented downtime?...
Guide
Our Privileged Access Management Solution - Your Sudo Replacement
Learn how to reduce the risk of insider fraud, streamline regulatory compliance, and greatly reduce administration efforts with an effective privileged access management solution.
Article
Sudo or SuDon't: Manage Your Privileged Command Execution and Sudo Policies
Mon, 03/13/2017
System admins need root level authority at all times, system operations staff needs periodic database and application account authority, and security admins needing to protect the environment are some of the few of the challenges of managing privilege in the enterprise server infrastructure. Read this article to learn more about Sudo alternatives.
Article
Managing IT Access Privileges
Mon, 03/13/2017
THE UNSOLVED PROBLEM
Secure, private, effective use of computers by a company (including hosted, cloud and other services as well as the company’s own systems) relies on managing access privileges.
The problem isn’t unique to computers. Office buildings, hotels, apartments and college dorms, for example, typically have “master keys” (or smart ID badges...
Article
Solving Healthcare Security Concerns
Mon, 03/13/2017
According to a recent KPMG report, four-fifths of executives at healthcare providers and payers say their information technology has been compromised by cyberattacks. That same report presents how the increased risk to healthcare organizations relates to the richness and uniqueness of the information that health plans, doctors and hospitals handle. Apart from typical financial fraud, there is also...
Article
Pros and Cons for Puppet's Configuration Management & Security
Mon, 03/13/2017
THE GOOD, THE BAD AND THE UGLY
I was at the Red Hat Summit in Boston at the end of June. We had a lot of activity at our exhibitor stand, and a lot of discussions being passed on to me by our sales team
I continued to have the same conversation again and again over the three days. This seems to be the year people have finished bedding down Puppet in...
Blog
Database Transaction Log Management
Mon, 03/06/2017
Don't let database transaction logs weigh you down. Find out how to preserve data integrity and consume less disk space.
Blog
How DR Compliance Requirements Impact HA Decisions
By Tom Huntington on Wed, 03/01/2017
Disaster recovery requirements are part of the geographic and industry regulations that affect our organizations. Having the right solutions in place can help to avoid penalties and make audits go smoothly. Read on to create a complete compliance toolkit.
Blog
How to Choose a Capacity Planning Tool
By Per Bauer on Tue, 02/28/2017
Looking for a capacity planning tool? Find out how to choose a tool that will be the most accurate.
On-Demand Webinar
Getting Started with Intermapper Flows Bandwidth Monitoring
By Pat Cameron
This webinar provides an overview of Intermapper Flows, the integrated network bandwidth monitoring tool within Intermapper that provides you with real-time information on the full activity of your network.