logo

Jeff Melnick

Jeff is a Director of Global Solutions Engineering at Netwrix. He is a long-time Netwrix blogger, speaker, and presenter. In the Netwrix blog, Jeff shares lifehacks, tips and tricks that can dramatically improve your system administration experience.
IT Operations
February 3, 2021

Best Server Monitoring Software Tools

If you don’t know the state of your network and server health every second of the day, you’re like a blind pilot inevitably headed for disaster. Fortunately, the market now offers many good...
Security & Compliance
January 28, 2021

Top GDPR Solutions for Security and Consent Management

The General Data Protection Regulation (GDPR) is a set of provisions and requirements governing data protection and privacy for individuals across the European Union. It applies to any business or...
IT Operations
January 15, 2021

Top 11 NTFS Permissions Tools for Smarter Administration

Managers and compliance auditors often ask IT admins to present a report listing file share permissions granted to a group or a particular user. Here are a few paid and free tools that will help you...
Security & Compliance
December 1, 2020

Cloud Computing Security Tools: Choosing the Right Solutions

No matter where you host your data, there are always risks. The public cloud is no exception. While providers like Amazon, Microsoft and Google offer security features, ultimately, cloud security is...
Security & Compliance
November 17, 2020

Data Classification in Microsoft 365

More and more organizations are recognizing the power and value of data classification. By accurately classifying and labeling the information you store, you can: Strengthen security by...
IT Operations
December 2, 2020

Guide to SQL Server Permissions

For anyone managing a SQL Server database, understanding permissions is critical to ensuring that only authorized users are able to view and modify data. This article explains the different types...
Security & Compliance
September 22, 2020

Hybrid Cloud Security

Hybrid cloud is an increasingly popular infrastructure option for companies in industries from game development to finance. But what is it, and what are the most effective hybrid cloud security...
Security & Compliance
October 13, 2020

How to Detect Ransomware

The second most common type of malware incident is the notorious ransomware attack. According to the Verizon 2020 Data Breach Investigations report, the primary aim of a ransomware attack is “to...
Show more articles