Best Practices

Active Directory Integration

How using active directory can increase security AND IT agility


Ad Hoc File Sharing

 Companies should consider more solutions and services that manage collaborative interactions and proactively apply encryption, access control, authentication, digital loss prevention and content management.   


Automated File Transfers

  IT teams that rely on a tangle of legacy scripts and manual processes to accomplish file transfer workflows are less agile, and more error prone and likely to expose sensitive data in a security breach.  


Bandwidth Monitoring Tools

By monitoring bandwidth usage, bandwidth monitor tools can proactively identify security issues like DDos attacks, unauthorized downloading and other suspicious network behavior.   


Enterprise File Synch and Share (EFSS)

  Regardless of efforts to enhance security, EFSS services mostly remain outside of IT control.  


Event Log Analyzing

With the number and size of the logs generated on Windows networks, it is best practice to use higher level tools to aggregate and analyze them.    


EVTX Format

The event log format introduced with Windows Vista and Windows 2008


File Non-Repudiation

Non-repudiation is the ability to prove that the file uploaded and the file downloaded are identical.  


File Transfer Compliance

Offers 8 technical controls that are key to passing file transfer compliance audits.


File Transfer Scripts

 Automating repetitive file transfer tasks via PowerShell scripts can save IT Pros a ton of time and eliminate human error, but you need to follow these best practices.   


GDPR

GDPR (General Data Protection Regulation) should be applicable across the 28 EU member states by the end of 2017. Are your data security practices in compliance with GDPR?  


J-Flow

Find out how to turn raw J-Flow data from Juniper devices on your network into business-impacting reports.  


Bandwidth Monitor

To ensure optimal network performance it's essential to monitor traffic and bandwidth usage across the LAN links.  


Link Layer Discovery Protocol (LLDP)


Asset Inventory

 An up-to-date inventory of hardware and software assets is vital for decisions on upgrades and purchases, tracking warranty status, troubleshooting and security. 


Network Capacity Planning


Configuration Manager


Network Device Discovery

Network device discovery is the first step in mapping and monitoring your networked infrastructure. 


Network Health

Software that can proactively assess and manage overall network, system and applications health should form a vital component of your organization's network monitoring strategy.  


Network Management Reporting

Your network management software should be able to collect and analyze data from all components of the network  


Network Monitoring Software

 It is best practice to install a network monitoring solution to provide better visibility into the network and to make it easier to maintain and troubleshoot.


MFT Gateway

An MFT Gateway allows security administrators to shelter data in a private network to meet advanced compliance requirements.


Secure Healthcare File Transfer

Transferring clinical data from one facility to another? Sending rich-media medical files to an attending physician? You'll need to do it securely and in compliance with HIPAA.  


Security and Compliance Frameworks

Companies in highly-regulated industries can adopt a security framework like PCI or COBIT to manage compliance initiatives.


SNMP Management Software

SNMP is currently considered the best choice by professionals for IP (Internet Protocol) network management  


SNMP Monitor

Quick overview of SNMP


SSH, WMI, Telnet, SNMP Monitoring

If you have heterogeneous network equipment and server vendors your network management tool should support all these technologies  


FIPS

FIPS 140-2 is a standard published by the U.S. National Institute of Standards and Technology (NIST) to ensure security, quality and compatibility of online services.


Virtual Infrastructure Management

 Discovery and inventory of virtual machines is essential to maintain security, and simplify troubleshooting and routine maintenance.  


Virtualization Architecture

It is best practice to holistically manage physical and virtual resources, network devices and applications from one single point of control.  


Windows Log Management

Windows log analysis should be a standard IT practice regardless of company size and sector.   


Best Practices: IT Management for Healthcare Services


Best Practices: Log Management & Compliance for the Healthcare Industry


Bandwidth Utilization

Monitoring bandwidth is one of the most critical aspects of network management and traffic monitoring software.  


Safe Harbour Regulations

Recently US organizations have come under fire for not adhering to Safe Harbor and recent court cases have put the future of Safe Harbor into question. 


Best Practices: Event Log Management for Security and Compliance


File Transfer Logging

  When considering what kind of logging you'll need, start with those internal and external needs as drivers.   


MFT Software

MFT (Managed File Transfer) software provides the security, reliability, and control required by businesses moving large volumes of sensitive or protected data. 


Network Mapping Tool

Network mapping tools enable the visualization of network device connectivity and logical network structure. 


NetFlow

NetFlow monitoring should be part of your IT monitoring strategy.   


Network Management Dashboards

Network management dashboards are ideal for trend predictions, performance analysis and for spotting security issues.   


SNMP Trap Receiver

Why SNMP trap receivers will never fully replace SNMP polling.


Syslog Server

A syslog server should deliver features that help you efficiently monitor and manage syslog messages to correlate events across your network.  


Using SNMP to Monitor Servers

SNMP is by far the most widely used network discovery and monitoring tool. Find out how to use SNMP to monitor network devices.


SFTP Server


FTP Software

What is, how to use and how to find FTP software.


IP Address Management

The IP address space is the backbone for the modern enterprise.  It’s essential for the hands-on IT professional to be on the lookout for conditions that could be detrimental.


How to Shift Gears from Manual to Automatic File Transfers Without Scripting

Every IT team wants to steer clear from the inefficiencies and costs that come from managing file transfer scripts needed to support important business functions. Below we showcase a customer's automation success story and a video on script-free file transfer automation.


How to Avoid Downtime and Keep Operations Running with Network Monitoring

Considering that industrial robots keep production moving at Klein Steel, a systems failure would cause everything to come to a grinding halt. Below we showcase this steel manufacturer’s network monitoring success story and a video on delivering continuous availability through network topology maps and performance analysis. 


How to Stay Ahead of Network Vulerabilities

Every IT team has to stay ahead of network vulnerabilities, especially those with a lot at stake. Below we showcase how a casino keeps its network properly configured to keep the back door shut tight along with a video on automated configuration management.   


Displaying results 1-50 (of 54)
 |<  < 1 | 2  >  >|