Implementation archives
Implementing Security Solutions to Support Your Business? Don’t Overlook These 3 Factors
In cybersecurity, a dangerous disconnect exists between what people think they know and what they actually know. Consider…
What Is Missing From Your Security Operations Strategy?
Countless companies consider cybersecurity a standalone issue. They view it as a task relegated for IT or a comparable department. Unfortunately,…
A Guide to Firewall Security in 2019
It’s no secret that firewall security is important. The online world is advancing at a record-breaking pace. And while the progress being made allows…
3 Examples of Security Infrastructure Automation in Action
Prioritizing cybersecurity and security operations can feel like an overwhelming obligation for organizations. As threats continue to evolve and become more…
Indeni Complements Your Monitoring Solution for Palo Alto Networks Firewalls
Five Reasons why enterprises deploy Indeni with their existing monitoring solutions. 1. Automate High Availability readiness checks Proactively automate…
Data Communication Platform Comparison: Apache Kafka vs. RabbitMQ vs. REST API
Before finalizing any major platform decision it is well known that extensive research must be conducted. This post highlights the process we went through…
How to Prove an Outage is Not Caused By the Firewall
Source We all know it. The Firewall is the scapegoat of the IT infrastructure stack. When something goes awry with the network, the firewall is the first…
Reduce the signal to noise ratio for issues up to 75%
IT operations are often experiencing alert fatigue as the influx of issues can be overwhelming. To alleviate this problem, we are introducing a new feature…
Hired a Network Engineer? Here Are 3 Things They Will Forget to Do
When you start a new job there are is a lot to learn. When you are a security engineer, the learning curve is especially steep. There are hundreds of…