<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">
Defrag This

| Read. Reflect. Reboot.

Posted on 03.01.19 by Greg Mooney

Podcast: 2018 Ipswitch EMEA Partner Awards

In this new Defrag This - Have You Met? offshoot series, Ipswitch EMEA Sales Director, Sebastien Roques announces the Ipswitch EMEA Partner Awards for 2018.

Posted on 02.26.19 by Jeff Edwards

Four Ways Network Monitoring Can Strengthen Your Security

The following is an excerpt from our Network Monitoring blog at whatsupgold.com/blog.

For most IT organizations, network monitoring is an essential tool. Network monitoring tools play an important role in letting IT pros get complete visibility into the status of network...

Posted on 02.25.19 by Greg Mooney

Podcast: IT Networks in Dangerous Environments

In this episode of Defrag This, we  discuss the nuances of IT networks in dangerous industries.

Posted on 02.20.19 by Michael O'Dwyer

Using Managed File Transfer (MFT) To Harden Data Security

How is it that so many organizations focus on perimeter defense but do little to protect the target data inside that perimeter? Wouldn’t it be wonderful to protect sensitive data even if the network is breached?

Posted on 02.19.19 by Adam Bertram

What is Workflow Automation?

Everyone has a morning routine that proceeds nearly the same way every day. We get up, brush our teeth, take a shower and put our clothes on. Every morning, this predictable routine repeats itself. It's like clockwork. It rarely, if ever changes. Think of your morning...

Posted on 02.11.19 by Greg Mooney

Four Types of Log Data to Manage and Monitor

There are so many types of log data to monitor and manage, but what are the most important logs to track? These are the top four types of log data that every IT team should be holding on to just in case.

Posted on 02.11.19 by Michael O'Dwyer

8 Reasons To Automate Your File Transfers

We all know it and are no doubt tired of hearing it, but in today’s global technological landscape, there is an ongoing and increasing danger of being hacked.

Posted on 02.08.19 by Mark Towler

Podcast: Log Management Basics - What should You Collect?

Log Management is a hot topic these days, especially in the way it pertains to organizational data security. So in this episode of Defrag This, your host Mark Towler sits down with Jim Cashman to quiz the latter on his sysadmin experience with Log Management.

Posted on 02.08.19 by Adam Bertram

How to Copy Files to Azure Blob Storage

When working with Microsoft Azure, you'll inevitably come to a point to where you need to access material stored locally on premise.

Posted on 02.07.19 by Greg Mooney

Podcast: Artificial Intelligence Vs. Automation for SecOps Teams

Automation is not always AI, but AI is an automated system. It’s easy to get the two terms confused because they both run off the same thing—data. However, the differences are far-reaching, and it’s important to know the differences between AI and Automation.

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.