Meet Netwrix at SpiceWorld Austin: Booth #18

Netwrix gladly invites you to visit the 7th SpiceWorld in Austin, TX taking place on 22-24 September 2014. Netwrix participates in SpiceWorld as a Silver Sponsor of the event. SpiceWorld brings together IT pros, tech vendors, and Spiceworks experts for two days geared at helping learn the latest and greatest in IT. A choice of 40+ … Continued

Preventing the Next Threat

IT security is as old as IT itself. That said, simply relying on the strategies of yesterday isn’t enough to combat modern threats. Case in point: over the past year we’ve witnessed two of the largest and most effective IT security breaches ever; Heartbleed and the Target breach. The most stunning detail about both of … Continued

Peeling the Onion: How to Survive an IT Audit

We continue the series of articles by Nick Cavalancia on our blog. The previous post was dedicated to Event Logging, today we are going to talk about general approach to IT Audit. An IT Audit is, generally speaking, a reactive activity. Some compelling event occurs – a security breach, a critical system has issues, or … Continued

Can You Make Sense of Your Security Logs?

The average IT Pro doesn’t need to be told stories about big data – you’ve been inundated with log data from dozens of sources for at least a decade before the term “big data” even came to exist. The concept of wanting security log and audit trail data being meaningful is also not new. Why, … Continued

Avoid Data Breaches: Top Five Tips

It is hard to keep up with all of the various computer security incidents occurring daily. One can’t help but wonder if more incidents are being reported and spreading through social media and internet news or if more incidents are taking place. It is likely both. The good news is, over the last couple of … Continued

Why Disaster Recovery Plans Fail

Let’s pause for a sec and see what we’ve covered so far.  We know that there are 4 pieces to Disaster Recovery and they are Mitigation, Disaster Planning, Response, and Disaster Recovery itself.  We’ve also defined Mitigation as those steps you can take to eliminate or lessen the impact an incident will have.  We even looked … Continued

Data Breaches Come in All Shapes and Sizes

We’re most likely to hear about the largest data breaches, the ones that affect big companies and lots of consumers, or the ones that involve nefarious hacking exploits to invade IT systems and exploit vulnerabilities. Those are the breaches that make headlines, that can be used to generate clicks and page views. And of course … Continued

Exchange 2013 Reseeding Automation

Reseeding is a process of updating the failed mailbox database to be in sync with the Active mailbox database. This has been greatly improved in Exchange 2013. Some of the new and interesting features in Exchange 2013 is Automatic Reseed and multiple databases per volume. AutoReseed is purposed to overcome the manual efforts of replacing … Continued