logo
December 27, 2023 | Dirk Schrader

Understanding the 4 Types of Network Monitoring Tools and Comparing Available Solutions 

Today, IT networks are the backbone of nearly every business. Simply put, if your network isn’t performing at its best, the flow of data and services will be impeded, and your business operations will suffer.   This modern reality makes effective server and network monitoring...
March 17, 2023 | Farrah Gamboa

How to Install TLS/SSL Certificates in NetApp ONTAP

HTTPS is the standard method for internet communications that transmit sensitive data. The TLS protocol is the backbone of HTTPS, encrypting connections so transmitted information can’t be intercepted or modified. Handpicked related content: [Free Guide] Network Security Best...
December 21, 2022 | Dirk Schrader

Firewall Log Management and SIEMs

Firewalls are the first line of defense in any network. Firewalls can be software or appliances, and organizations can configure them up to allow or disallow some or all IP traffic, or to verify specific traffic types based on rules that use deep packet inspection. For maximum effectiveness,...
October 11, 2022 | Dan Piazza

What DNS over HTTPS (DoH) Is & How to Enable in Windows 10

Why Move from Traditional DNS to DNS over HTTPS When your web browser accesses a website, it needs to first translate the friendly URL (such as Netwrix.com) to the public server IP address of the server that hosts that website. This is known as a DNS lookup. Traditional DNS is unencrypted, unlike...
August 16, 2022 | Dirk Schrader

Handling Open Ports Secure and Finding Vulnerabilities

A port can be defined as a communication channel between two devices in computer networking. So, are there any security risks connected to them? An unwanted open port can be unsafe for your network. Open ports can provide threat actors access to your information technology (IT) environment if...
August 16, 2022 | Dirk Schrader

What Network Security Is and How to Fortify It

Cybersecurity threats are greater than ever. For example, the world has suffered a 645% increase in distributed denial-of-service (DDoS) attacks QoQ in March 2022, and a rise in ransomware equal to the past five years combined. Incidents like the SolarWinds hack of 2020 demonstrate that threats...
August 4, 2022 | Dirk Schrader

Open Port Vulnerabilities List

Insufficiently protected open ports can put your IT environment at serious risk. Threat actors often seek to exploit open ports and their applications through spoofing, credential sniffing and other techniques. For example, in 2017, cybercriminals spread WannaCry ransomware by exploiting an SMB...
December 3, 2019 | Rebecca James

Zero Trust Model: 4 Common Myths Exposed

Whether your IT infrastructure is on premises, in the cloud or hybrid, it is at risk of data breaches. By compromising a single user’s credentials, attackers can breach your organization’s network security and gain access to all the sensitive data the account can reach. The more powerful the...
July 9, 2019 | Brian Johnson

10 Fundamental Elements of Network Security to Improve Data Security

If you do a Google search for products and services that can help your company be more secure, your Web browser might very well explode. The sheer number of results you’ll get — solutions promising everything from a hack-proof network to a cure for major diseases — will likely leave you...
February 21, 2019 | Jeff Melnick

Why Native Network Device Auditing Is Not Enough

In one of my previous blog posts, I shared the top issues that network device auditing can help you solve. Among them are controlling device configuration, detecting unauthorized actions and thwarting scanning threats. In short, I argue that to keep your network infrastructure secure and ensure...
Show more articles
...