logo
March 27, 2020 | Rebecca James

Zero Trust Model: 4 Common Myths Exposed

Whether your IT infrastructure is on premises, in the cloud or hybrid, it is at risk of data breaches. By compromising a single user’s credentials, attackers can breach your organization’s network security and gain access to all the sensitive data the account can reach. The more powerful the...
March 27, 2020 | Brian Johnson

10 Fundamental Elements of Network Security to Improve Data Security

If you do a Google search for products and services that can help your company be more secure, your Web browser might very well explode. The sheer number of results you’ll get — solutions promising everything from a hack-proof network to a cure for major diseases — will likely leave you...
May 20, 2020 | Jeff Melnick

Why Native Network Device Auditing Is Not Enough

In one of my previous blog posts, I shared the top issues that network device auditing can help you solve. Among them are controlling device configuration, detecting unauthorized actions and thwarting scanning threats. In short, I argue that to keep your network infrastructure secure and ensure...
October 3, 2019 | Jeff Melnick

Why Monitoring of Network Devices Is Critical for Network Security

A secure network infrastructure is critical for organizations, and that requires keeping close track of what’s going on with routers, switches and other network devices. You need to be able to quickly detect and investigate threats to your perimeter security, such as unauthorized changes to...
October 3, 2019 | Jeff Melnick

Network Security Devices You Need to Know About

Using the proper devices and solutions can help you defend your network. Here are the most common types of network security devices that can help you secure your network against external attacks: Firewall A firewall device is one of the first lines of defense in a network because it isolates one...
October 29, 2019 | Jeff Melnick

Top 10 Best Network Monitoring Tools

If you don’t know the state of your network every second of the day, you're like a blind pilot inevitably headed for disaster. Fortunately, the market now offers many good software solutions, both commercial and open source, for network monitoring. Handpicked related content: [Free...
October 4, 2019 | Jeff Melnick

Network Devices Explained

To build a strong network and defend it, you need to understand the devices that comprise it. What are network devices? Network devices, or networking hardware, are physical devices that are required for communication and interaction between hardware on a computer network. Types of network...
May 13, 2019 | Ryan Brooks

Active Directory Security 101, Episode 1: Listen and Learn

Active Directory is the foundation of authentication and authorization in your IT environment, so you need to know how to keep it secure. That’s why Netwrix is happy to support a 7 Minute Security podcast about the fundamentals of Active Directory security. In this episode, Brian Johnson, the...
October 29, 2018 | Ryan Brooks

What’s New in Netwrix Auditor 9.7

Netwrix Corporation, provider of a visibility platform for data security and risk mitigation in hybrid environments, today announced the release of Netwrix Auditor 9.7 platform. Upgraded Netwrix Auditor enables organizations to detect and investigate network security threats. A free trial of...
May 22, 2020 | Jeff Melnick

Top 10 Best Windows Server Monitoring Software Tools

If you don’t know the state of your network and server health every second of the day, you're like a blind pilot inevitably headed for disaster. Fortunately, the market now offers many good tools, both commercial and open source, for network and Windows Server monitoring. Since good and free...
Show more articles
...