logo

Jeff Melnick

Jeff is a former Director of Global Solutions Engineering at Netwrix. He is a long-time Netwrix blogger, speaker, and presenter. In the Netwrix blog, Jeff shares lifehacks, tips and tricks that can dramatically improve your system administration experience.
Infrastructure
April 28, 2021

SIEM vs Log Management

It now takes organizations 207 days to identify and 73 days to contain security breaches, according to IBM's 2020 Cost of a Data Breach Report. That means the average "lifecycle" of an incident is a...
Identity
April 21, 2021

Active Directory Auditing Guidelines

Active Directory provides account management, authentication and authorization services that are critical for strong access governance. Accordingly, proper Active Directory auditing is essential for...
Compliance
January 27, 2021

Top GDPR Solutions for Security and Consent Management

The General Data Protection Regulation (GDPR) is a set of provisions and requirements governing data protection and privacy for individuals across the European Union. It applies to any business or...
Data
November 3, 2020

Data Classification in Microsoft 365

More and more organizations are recognizing the power and value of data classification. By accurately classifying and labeling the information you store, you can: Strengthen security by...
Infrastructure
October 16, 2020

Guide to SQL Server Permissions

For anyone managing a SQL Server database, understanding permissions is critical to ensuring that only authorized users are able to view and modify data. This article explains the different types...
Infrastructure
September 17, 2020

Hybrid Cloud Security

Hybrid cloud is an increasingly popular infrastructure option for companies in industries from game development to finance. But what is it, and what are the most effective hybrid cloud security...
Infrastructure
September 3, 2020

How to Detect Ransomware

The second most common type of malware incident is the notorious ransomware attack. According to the Verizon 2020 Data Breach Investigations report, the primary aim of a ransomware attack is “to...
Show more articles