<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">
Defrag This

| Read. Reflect. Reboot.

Posted on 07.20.18 by Julianna Bernardi

FIPS Validated vs. FIPS Compliant

If you work in IT for a regulated industry, security is one of your top priorities. Especially when working for the government, healthcare or finance, it is extremely important that products and services adhere to government-approved security requirements to ensure that...

Posted on 07.19.18 by Jeff Edwards

Five Best Practices for Network Configuration and Change Management

When your business is growing so is your network. Even when business isn’t booming (thanks economy) your business’ infrastructure can be evolving too. What you need is a software tool that’s able to manage these network changes for you.

Posted on 07.18.18 by Mark Towler

Primed for Failure — How to Avoid Amazon's Mistakes

Amazon’s heavily-promoted Prime Day event started off with Amazon falling flat on its face right out of the gate. Their site was non-responsive for hours with would-be shoppers getting served pictures of dogs instead of the amazing deals they were promised. Real-time web...

Posted on 07.18.18 by Greg Mooney

Why Are File Transfers Considered High Risk?

External file transfers of digital assets are risky for everyone—no matter if you’re a healthcare organization, financial institution, insurance company, retail store, manufacturer or in education.

Posted on 07.17.18 by Kevin Conklin

What is Network Flow Monitoring?

Just what is network flow monitoring? To put it simply, network flow monitoring is a way of looking into the actual traffic flowing across a network.

Posted on 07.13.18 by Adam Bertram

How to Build a Function in PowerShell

Functions are a common occurrence in PowerShell and to truly understand the PowerShell language, it's important that you know how functions work. In this article, we're going to show how a PowerShell function evolves from basically nothing all the way to having...

Posted on 07.12.18 by Greg Mooney

Defrag This - California's New Consumer Privacy Act

In this episode of Defrag This, we discuss the repercussions the new California Consumer Privacy Act will have on US data privacy laws and how and if it relates to the GDPR.

Posted on 07.11.18 by Dan Franciscus

Auditing Software with Chocolatey

Knowing what software is installed on your desktops and servers is crucial in an organization. This is common sense to sysadmins. We like to know information such as installation date, version and who installed it. By default, in Windows, you can get some of this...

Posted on 07.11.18 by Joe Hewitson

The HIPAA Security Rule: How to Better Manage Compliance

Document sharing is a double-edged sword in modern healthcare. On one hand, the ability to quickly and efficiently share critical patient information between authorized medical professionals can make all the difference in patient care. On the other hand, health care...

Posted on 07.10.18 by Adam Bertram

What is SaltStack?

SaltStack/Salt is a configuration management (CM) and orchestration tool that enables system administrators to automate server provisioning and management tasks. Salt is comparatively a newcomer in the CM segment as it was launched in 2011, at a time when Puppet and Chef...

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.