by Dutta | Feb 28, 2019 | Cyber security, Flexera-Software Asset Management Tools, FlexNet Code, Patch Management, SAM, Software License Optimization, Software Updater, Software Vulnerability Management, Vulnerability Assessment, Vulnerability Management
The job of an ITAM team is never done, is it? Just when your software asset management program starts to mature, cloud and SaaS raise the bar on what’s needed to keep spending and risk under control. Now that we are starting to see SaaS spend management and...
by Dutta | Feb 26, 2019 | Cyber security, Endpoint Security, Flexera-Software Asset Management Tools, Identity Management and Access Control, Mobile Device Management, Network Configuration Management, Network Monitoring, Other Security Topics, Patch Management, Secure File Transfer, Service Management, Software License Optimization, Workspace Management
Ipswitch, Inc.FlexeraBomgar CorporationMatrix42emt Distribution METAMohd MobasseriNandini SapruMatt Scotney-JonesVishal...
by Dutta | Feb 26, 2019 | Vulnerability Assessment, Vulnerability Management, Web Application Security, Web Security, Web Vulnerability Scanner
Acunetix version 12 (build 12.0.190206130 – Windows and Linux) has been released. This new build makes it easier to record Login Sequences which can be used to scan restricted areas, and provides support to provide Swagger and WSDL as import files to be used by the...
by Dutta | Feb 24, 2019 | CPU Utilization, Cyber security, Dashboard, Mapping, Network Configuration Management, Network Monitoring, Network Traffic Analysis, Performance Monitoring, Reporting, Security, Traffic Analysis, Wireless Monitoring
The following is an excerpt from our Network Monitoring blog at whatsupgold.com. In this post, you’ll learn what SNMP is, how it works, and the uses and limitations of the protocol. Simple Network Management Protocol (SNMP) is a standard set of...
by Dutta | Feb 21, 2019 | Access Control, Content Aware Protection, Cyber security, Data Leakage Prevention - DLP, Data Loss Prevention, Data Security, Device Control, Easy Lock, Encryption, Endpoint Security, Mobile Device Management
Nowadays, the majority of businesses work with a mixture of device types and operating systems. Cross-platform Data Loss Prevention (DLP) solutions help diminishing security vulnerabilities in heterogeneous IT environments. Over the past decade, the organizations have...