Blogs

View All RSS Feed

Last Updated on 21 Jan. 2016, Total: 1368 Blog Posts

762 George Chetcuti’s Blog
606 Windows Networking Admin Blog
  1. Netwrix Offers IT Auditing through CenturyLink’s Cloud Marketplace

    Netwrix Auditor will empower CenturyLink Cloud users with complete visibility into cloud IT infrastructure... Read More

  2. December Newsletters Teaser

    Topics covered in CloudComputingAdmin.com, VirtualizationAdmin.com, MSExchange.org, WindowsNetworking.com and WindowSecurity.com monthly newsletters... Read More

  3. The City of Westminster Ensures Consistent Delivery of City Services, While Saving 180 Man-Hours a Year, with DH2i Container Management Software

    Growing Colorado City Turns to DxEnterprise Software to Achieve Greater Management Consistency and Efficiency Across Microsoft SQL Server Environment... Read More

  4. Jedi IT Security Code: 5 Tenets to Defend against Data Breaches

    Netwrix outlines common principles for IT pros to maintain data integrity and mitigate risks of cyber attacks... Read More

  5. Don’t Give the Cyber Criminal A Present This Christmas

    Post submitted by the Scottish Business Resilience Centre, SBRC was set up with the objective of creating a secure Scotland for business to flourish, encompassing everything from cyber security to all aspects of premises and employee safety... Read More

  6. Last chance to sign up for the webinar: How to Plan and Complete a Secure Office 365 Migration

    Live Webinar: December 10, 2015 @ 11am or 4pm EST | 8am PST or 1pm PST, US Time There are many pathways to an Office 365 migration, but completing the migration is only part of the solution. While Office 365 offers capabilities for Identity Management, it’s limited in protecting data once it leaves the platform... Read More

  7. DH2i Unveils New Sandbox Lab for the Rapid Proof of Concept (POC) Testing of Container Management Software for Microsoft Windows Applications

    New POC Lab Demonstrates How Enterprises Can Go from Standalone to High Availability (HA) Failover Clusters in Just a Few Minutes... Read More

  8. Patching: A Primer on Protecting an Organization’s Proprietary Information

    Guest post by Robert Brown, director of services Verismic Software... Read More

  9. Security Concerns and Lack of Visibility Hinder Cloud Adoption, Say 65% of IT Pros

    Netwrix 2015 Cloud Security Survey reveals unauthorized access and account hijacking are the leading security risks associated with the cloud... Read More

  10. Dell creates security vulnerability unintentionally

    Dell ships laptops with rogue root CA, exactly like what happened with Lenovo and Superfish... Read More

Featured Links