For more information on NTM, visit: bit.ly Learn how easy it is to create a detailed Microsoft Office Visio diagram of your network topology with SolarWinds Network Topology Mapper.
Alert Central Overview: Multi-system IT Alert Management
For more information: bit.ly Get a guided tour of Alert Central from SolarWinds. This great free product delivers multi-system alert management for your entire organization. Manage alerts, escalations, and on-call scheduling from one user-friendly product.
One Brand of Firewall is a Best Practice
In case you haven’t seen it, there’s an interesting research note authored by Greg Young of Gartner that posits “one brand of firewall is a best practice for most enterprises.” And, in particular we have to agree. Why? Let’s go back to 1999 and see. Taking a quote from Bruce Schneier’s, A Plea for Simplicity, “the worst enemy of security is complexity.” Thirteen years later, Gartner also seems to agree; saying basically that having different firewall platforms increases configuration and m…
Reality vs Myth- Storage for Xen Desktop-2 of 5
Reality vs Myth- Storage for Xen Desktop-2 of 5 Check Out www.citrixnetapp.com for more technical content
SolarWinds Standard Toolset Overview
For more information on Engineer’s Toolset, visit: www.solarwinds.com With SolarWinds Standard Toolset, you will always have the right network tool for the job. Monitor & alert in real time on network availability & health with tools including Real-Time Interface Monitor, SNMP Real-Time Graph, & Advanced CPU Load.
Twitter Hacks: How Avoid Being the Next Victim
Perhaps it had been too long since Twitter was the center of the public attention. Drama junkies were treated to a triple-whammy of cyber news this week when miscreants hacked into the Twitter accounts of Jeep, Burger King and none other than the global hacker collective Anonymous. In an ironic twist of plot, the infamous hacker group’s Twitter account was apparently overtaken by rival hacktivists, according to the BBC.
The Game of Security Evasion
Evasion techniques have existed ever since attacks were created, that’s no secret.
FortiOS Cookbook – Remote AP (5.0)
In this video, you’re going to learn how to use a Remote AP to provide secure remote access to protected networks and the internet.
02 – Power to Control Data
Artist: Terry Devine-King-Solar Storm
Fortinet’s FortiGuard Labs Discovers Critical Vulnerabilities in Adobe Shockwave Player
Affected Software Could Allow an Attacker, Who Successfully Exploits These Vulnerabilities, to Run Malicious Code on the Affected System SUNNYVALE, Calif., February 20, 2013 ― Fortinet® (NASDAQ: FTNT) − a world leader in high-performance network security – today announced the company’s FortiGuard Labs has identified critical zero-day vulnerabilities in Adobe Shockwave Player. Fortinet’s FortiGuard Labs consist of over 175 researchers and analysts world-wide, working to discover, monito…