Showing content for author: Katie Burton
35 posts
35 posts
What Is Missing From Your Security Operations Strategy?
Countless companies consider cybersecurity a standalone issue. They view it as a task relegated for IT or a comparable department. Unfortunately,…
Security Infrastructure Automation Transforms IT From Expense to Investment
Maintaining forward business momentum hinges on properly managing information and processes. Businesses unable to secure their infrastructure technology see…
How to Prove an Outage is Not Caused By the Firewall
Source We all know it. The Firewall is the scapegoat of the IT infrastructure stack. When something goes awry with the network, the firewall is the first…
How Customers Use Check Point Firewalls Around the Globe
Ever wanted to know how Check Point firewallls are being used around the World? With indeni Insights, you can get a glimpse into that data 24/7. See how.
Expert Review of Runbook Templates
Runbook templates are used by operations teams to automate routine maintenance and respond to system alerts and outages. Infrastructure is changing so…
Where does Indeni fit in your environment?
We get it. The network and security software markets are difficult to navigate. There is an overwhelming list of technologies that you could use to…
Just Like Devices Need Software Upgrades, So Do Employees
Grow Your Talent From Within Through Certifications As your company transforms from a product to a platform, undergoes a merger and acquisition, or embarks…
Do you trust this [network] computer
How to set AI and Machine Learning up for Success in Enterprise Networks A documentary titled “Do You Trust This Computer?” was recently released, and…
How Can Collaboration Between Operations & Engineering Be Enhanced?
Increasing collaboration between various departments in an organization will help it become more agile. If disparate network administration and security…
Why You Need to Automate Your Business Operations
Automation has been a buzzword in business circles for decades now, and with good reason. Organizations are looking to cut costs and increase efficiency in…
Announcing Automation for Check Point Scalable Platform Appliances: 41000 and 61000
When we work with a company who has Check Point 41000 and 61000 Security Systems chassis as part of their security infrastructure, we know we are dealing…
Why is Automated Provisioning last on the Priority List?
The importance of provisioning network and security resources is often times overlooked. In the course of moving Data Centers from bare-metal infrastructure…
We’re using cookies on this website to improve your experience. Cookies help us learn how you interact with our website and remember you when you come back so we can tailor it to your interests.
To learn more about cookies and how we use them, read our cookie notice.
Some cookies are essential, while others help us to improve your experience by giving us insight into how you are using our website. You may adjust your preferences for non-essential cookies below.
To learn more about cookies and how we use them, read our cookie notice. You can also review our privacy policy for more details on the personal data we collect, use, hold, and disclose when you visit our website or use our products and services.
Functional cookies are essential cookies that allow us to remember choices or changes you have made (such as to language settings or your choices regarding the use of cookies). These cookies cannot be turned off since they are essential for the operation of our Websites.
Analytics cookies are non-essential cookies that collect information on how visitors use our Websites. We use this information with your consent to measure the number of visitors to our Websites, determine whether specific content or communication has been viewed, and to help us improve our Websites and communication. These cookies can be turned off.
Personalisation cookies are non-essential cookies that collect information when you fill out a form on this website. We only use this information with your consent to pre-fill other forms on the site. These cookies can be turned off.
Marketing cookies are cookies that are placed by third parties to collect information about your visits and actions on our Websites so that they or we can deliver ads to you later, such as when you are on certain third-party sites or platforms. These cookies may be used by those third parties to build a profile of your interests and show you relevant ads on other websites. These cookies also enable visitors to our Websites to share content on social networks and to enable and evaluate interactions with our communication and social media tools. These cookies can be turned off.