<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">
Defrag This

| Read. Reflect. Reboot.

Posted on 03.06.19 by Prateek Singh

How to Automate AWS S3 Static Websites Using Python

Amazon Web Services offers a very popular object storage service known as Amazon S3 (Simple Storage Service) that enables you to store data, files, images and even videos in highly available containers called ‘buckets’ which are also easy to access endpoints using any...

Posted on 03.04.19 by Jeff Edwards

How Workflow Automation Eases File Transfer Growing Pains

Your IT team strives to deliver non-stop, high-performance services in support of your organization. It can be surprising how big of a role file transfer services can play in that effort.

Posted on 03.04.19 by Dan Franciscus

Managing Active Directory Fine-Grained Password Policies with PowerShell

Before Windows Server 2008, Active Directory password policies were done with default domain group policy, and there could only be one policy for an entire Active Directory domain. This is very limiting if users would like to give different policies to different users,...

Posted on 03.01.19 by Greg Mooney

Podcast: 2018 Ipswitch EMEA Partner Awards

In this new Defrag This - Have You Met? offshoot series, Ipswitch EMEA Sales Director, Sebastien Roques announces the Ipswitch EMEA Partner Awards for 2018.

Posted on 02.26.19 by Jeff Edwards

Four Ways Network Monitoring Can Strengthen Your Security

The following is an excerpt from our Network Monitoring blog at whatsupgold.com/blog.

For most IT organizations, network monitoring is an essential tool. Network monitoring tools play an important role in letting IT pros get complete visibility into the status of network...

Posted on 02.25.19 by Greg Mooney

Podcast: IT Networks in Dangerous Environments

In this episode of Defrag This, we  discuss the nuances of IT networks in dangerous industries.

Posted on 02.20.19 by Michael O'Dwyer

Using Managed File Transfer (MFT) To Harden Data Security

How is it that so many organizations focus on perimeter defense but do little to protect the target data inside that perimeter? Wouldn’t it be wonderful to protect sensitive data even if the network is breached?

Posted on 02.19.19 by Adam Bertram

What is Workflow Automation?

Everyone has a morning routine that proceeds nearly the same way every day. We get up, brush our teeth, take a shower and put our clothes on. Every morning, this predictable routine repeats itself. It's like clockwork. It rarely, if ever changes. Think of your morning...

Posted on 02.13.19 by Kevin Conklin

HIPAA Compliance & Managed File Transfer: Do You Have a Safety Net?

Security breaches are occurring at an alarming rate as cybercriminals continue to successfully infiltrate the IT infrastructures of organizations across many industries. 

Posted on 02.11.19 by Greg Mooney

Four Types of Log Data to Manage and Monitor

There are so many types of log data to monitor and manage, but what are the most important logs to track? These are the top four types of log data that every IT team should be holding on to just in case.

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.