<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">
Defrag This

| Read. Reflect. Reboot.

Recent Posts

Posted on 10.29.18 by Nate Lewis

Safeguarding Your Network From Insider Threats

"The call is coming from inside the house...” This line from 1979’s When a Stranger Calls terrorized audiences by introducing the notion that the things we should be most fearful of may be in the spaces we feel most safe. This idea translates neatly to the enterprise...

Posted on 10.03.18 by Nate Lewis

The IT Guide to Handling BYOD Security Risks in the Workplace

Holding off from adopting a BYOD policy is an uphill battle. In the past five years alone, we’ve seen a number of significant shifts in technology and workplace culture. With these new changes come new security risks, so how do we address them?

Posted on 09.28.18 by Nate Lewis

What you Need to Know About FIPS 140-2 Validation

One look at the headlines is all it takes to see why security is at the forefront of every IT team’s mind. Hacks, data theft—you name it; some of the largest corporations have succumbed to these pitfalls over the past few years, and there’s no end in sight. It's no...

Posted on 09.21.18 by Nate Lewis

Measuring The Benefits of Managed File Transfer for Insurance Companies

Privacy is something that every organization needs to take seriously. When customers and clients trust an organization with their private information, that trust needs to be respected. As with healthcare, the insurance industry needs to adhere to significant regulation.

Posted on 08.29.18 by Nate Lewis

How to Choose a Network Configuration Management Tool

Network teams have a lot on their plate. No one’s disputing that. Today, network admins are provided with a wide range of network management tools that can make their job just a bit easier. That said, it’s not as easy as just picking out a solution and crossing your...

Posted on 08.06.18 by Nate Lewis

The Real Cost of File Transfer Software

We’re living in the age of information. In both the world of the enterprise and in our own personal lives, we expect speed first and foremost. The exchange of data between customers, employees, and partners is become a critical component of business operations. Shadow IT...

Posted on 06.26.18 by Nate Lewis

How to Enable and Configure SNMP for Network Monitoring

It doesn’t take a ninja to know that Simple Network Management Protocol allows administrators to monitor network-attached devices. That said, you might actually need to be a ninja to enable and configure SNMP on Windows, Linux/Unix, Cisco, and ESXi.

Posted on 05.29.18 by Nate Lewis

Why SFTP Can Fail GDPR Compliance

After spending years as a far-off date on CIO calendars, GDPR is finally here. The General Data Protection Regulation applies to all organizations that process the personal data of EU residents, even if the organization itself is based outside of the EU. The penalties...

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.