[metaslider id=2951] … Read More
Quickly identify and eliminate the most common IT Security Threats –
- Spear Phishing
- Escalation of Permissions
- SQL Injection
- DDoS Attacks
Check out the new Threat Intelligence Feed from SolarWinds – Log and Event Manager
Gartner 2016 Magic Quadrant Positions SolarWinds Highest in “Ability to Execute” for Network Performance Monitoring and Diagnostics
AUSTIN, TX–(Marketwired – March 02, 2016) – SolarWinds, a leading provider of powerful and affordable hybrid IT infrastructure management software, today announced that the company has been included in the Gartner, Inc. 2016 Magic Quadrant® for Network Performance Monitoring and Diagnostics (NPMD)* as a Challenger. In addition, the report positions SolarWinds highest along the “Ability to Execute” axis.
“We believe our position in the Gartner® NPMD Magic Quadrant is reflective of our commitment to eliminating the complexity that IT professionals face in their environments today,” said Nikki Jennings, group vice president, product strategy, SolarWinds. “By developing powerful solutions that address real-world problems out of the box with no professional services required, SolarWinds provides accessible and immediate value to help IT Pros reach their most-pressing network infrastructure health and performance goals that drive the business forward.”
According to Gartner, “The goal of NPMD products is not only to monitor the network traffic and infrastructure to facilitate outage and degradation resolution, but also to identify performance optimization opportunities.”
As part of its research, Gartner tested SolarWinds’ NPMD offering featuring Network Performance Monitor and NetFlow Traffic Analyzer.
SolarWinds Network Performance Monitor provides a comprehensive view of network fault, performance, availability, and latency to more effectively identify, prioritize and resolve network issues before they impact application performance, end users and businesses.
SolarWinds NetFlow Traffic Analyzer provides a platform to aggregate and analyze all flow data, including NetFlow, J-Flow, sFlow®, IPFIX, and NetStream® data, enabling IT Pros to keep a close watch on network traffic data, identify bandwidth hogs and build customized reports of network traffic.
Contact us for more information
The news is full of stories of large well respected organizations (Target, Home Depot, Sony) and government agencies being victims of cyber crimes. Reporters than make statements like – well if these organizations can be victims, what does that mean to the small/midsized organizations.
So the truth is that no one is safe from cyber threats, to the cyber criminals organizations are just numbers (IP Addresses) and they are looking for those that have a weakness that can be exploited.
The challenge is to eliminate the weaknesses to the best of your ability. As I was writing this, I am reminded of the story of the Three Little Pigs and the Big Bad Wolf – funny how security can relate to a fable written in 1886. We all know the story – the first pig builds his house out of straw, which, unfortunately for the pig was not the best idea. The second pig builds his house out of sticks – again the news is not great for the pig. The third pig, takes his time and builds his house out of bricks, the wolf discovers that he cannot blow down the house, and has to revert to other tactics to get into the house. ( Denial of Service ).
He then attempts to trick the pig out of the house by asking to meet him at various places ( social engineering ), but the pig outsmarts him every time. Ultimately the wolf attempts to come down the chimney, where the pig captures the wolf.
In a very rudimentary way – this is how security works, first take your time and ensure that you have strong “perimeter defense” (an enterprise class firewall) , ensure that you have visibility on your “perimeter” so that you can see who is trying to get in, make sure that if they do get in that there is a way to limit their effectiveness be it antimalware (to quarantine viruses, malware, ransomware),or network access control (to stop data exfiltration).
Looking at these large, global entities, and putting into the perspective of the three little pigs – if the pig built an apartment complex, there are numerous ways to get in (windows/balconies), and even with an alarm, you are running from floor to floor to capture the wolf.
For those that of us that are not Target, Home Depot, etc, there are ways to protect yourself, as well as to attempt to identify who the cyber criminal is. I invite you to contact us to discuss your concerns, email at email@example.com or call at 866-431-8972.
Latest Version of SolarWinds Network Configuration Manager Leverages the National Vulnerability Database in a Security Content Automation Protocol (SCAP) Compliant Manner to Identify Device Vulnerabilities and Provide Automated Remediation Actions
AUSTIN, TX, Jun 10, 2015 (Marketwired via COMTEX) — SolarWinds SWI, +0.59% a leading provider of powerful and affordable IT performance management software, today announced enhancements to SolarWinds(R) Network Configuration Manager (NCM), its network device configuration and change management product for Cisco(R), Juniper(R), HP(R), Dell(R), and Brocade routers and switches and any other device with a command line interface. The latest version makes it easier to demonstrate security compliance by automatically performing vulnerability scanning on Cisco Adaptive Security Appliance (ASA)- and Internetwork Operating System (IOS(R))-based devices using Common Vulnerabilities and Exposures (CVE) published by the National Vulnerability Database (NVD). Additionally, SolarWinds NCM now provides automated remediation options and National Institute of Standards and Technology (NIST(R)) Federal Information Security Management Act (FISMA) and Defense Information Systems Agency (DISA(R)) Security Technical Implementation Guide (STIG) compliance reports out-of-the-box.
“IT pros have traditionally focused on configuration details and assumed that means that network routers, switches and firewalls are secure. But with security becoming an ever growing concern for IT pros, it is important to ensure that network devices themselves, and the software that they run on, do not contain weaknesses and that any new vulnerabilities are remediated quickly,” said Nikki Jennings, group vice president, products and markets, SolarWinds. “Security tools focused on the actual network devices are few and far between and often IT pros find themselves manually updating and patching device software, but SolarWinds NCM now automatically identifies vulnerabilities and assists in the remediation of issues providing IT pros with peace of mind.”
The new integration of SolarWinds Database Performance Analyzer with the SolarWinds Orion technology backbone provides developers, database and systems professionals with unified visibility into the role each element of the infrastructure stack has on application performance, increasing collaboration and reducing friction.
AUSTIN, Texas – June 3, 2015 – SolarWinds (NYSE: SWI), a leading provider of powerful and affordable IT performance management software, today announced the integration of SolarWinds® Database Performance Analyzer (DPA) with the SolarWinds Orion® technology backbone. The integration represents a significant milestone that enables stronger collaboration between database and systems administration teams to ensure the performance of business-critical applications by presenting wait time analysis and other key database performance metrics in the context of the application, all within the familiar SolarWinds Orion user interface.
According to a recent application performance management (APM) survey by Gleanster Research, 88 percent of respondents cited the database as the most common challenge or issue with application performance. Furthermore, 71 percent said their current APM tools only provide hints, but rarely identify the root cause of problems. This lack of visibility into the impact of database performance on applications is a key barrier to ensuring the availability of business-critical applications and also exacerbates a lack of collaboration between database and systems administrators.
With the integration of SolarWinds DPA with SolarWinds Orion—with which other key products in SolarWinds portfolio, including SolarWinds Server & Application Monitor (SAM) and SolarWinds Storage Resource Monitor (SRM), also integrate—SolarWinds now provides database and systems administrators:
- A single view of performance, uptime, capacity and resource utilization across the stack—applications, databases, hypervisors and servers—to help pinpoint inefficient code, resource bottlenecks and application performance issues.
- Deeper application-specific context for database operations, asset management, instance discovery, capacity planning, index fragmentation and agent job status.
- Improved ability to figure out what to fix and more time actually fixing problems with wait-time analytics, performance-to-resource correlation and tuning advice.