Defrag This | Read. Reflect. Reboot.

Posted by Jacqueline Lee

How to Meet SLAs in Health Care IT

Many health care IT organizations create service-level agreements (SLAs) for new applications and infrastructure projects. It's important to collect metrics related to SLA line items and review your metrics on a regular basis.

Posted by Jacqueline Lee

A Day in the Life of a Healthcare CIO — No Pressure!

Some things happen to a healthcare CIO that just don't happen to IT execs outside of the healthcare industry. On some days, you walk down the hospital corridors beaming, thinking of how your work directly improves human health and quality of life. On other days, you'd...

Posted by John P. Mello Jr.

Law Enforcement IT Gets No Respect From Cybercriminals

Police department computers contain large amounts of sensitive data about their communities, the citizens in those communities and the men and women who work for those departments. Protecting that information is the job of law enforcement IT. Police IT departments aren't...

Posted by John P. Mello Jr.

Cyber Summit Takes on Tough Security Issues

In early October, security experts from government, academia and the private sector gathered in Cambridge, Mass. for a day-long conference on cybersecurity.

Posted by Dave Ceddia

How to Learn React (and Build Something)

I want to learn React… but what should I build?

Posted by Jason Alberino

WUG Ninja: Why Disable an Interface Active Monitor?

Ever think you have an issue with the interface active monitor in WhatsUp Gold being added back to devices after being removed? This is in fact, working as intended. Let me explain why!

Posted by Kevin Conklin

What is at Stake When Moving Files Today?

FTP (File Transfer Protocol) has been the standard bearer for sending or moving files too large for email. Today, those file transfers contain the lifeblood of an organization and so Secure FTP is now critical.

Posted by Richard Allen

What is Managed File Transfer?

Just what is managed file transfer (MFT)? It’s easy to think of MFT as little more than file transfer on steroids, or a super slick FTP server. MFT is more than that because the problems IT administrators solve with MFT demands more. No one move files for fun – they move...

Posted by Richard Allen

Three Compliance and Security Predictions for 2017

Compliance stays in the picture. Why? Because today’s agile business environment requires employees to share data, information and other documentation both inside and outside their organizations on a regular basis. But for companies in highly regulated industries –...

Posted by Greg Mooney

Defrag This - Episode 2 - Encryption in a Unified Security Posture

Businesses in healthcare struggle with double standards, highly complex security infrastructure that is disjointed and redundant.

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.