Most Recent

Does Your Cloud Environment Have Enough Protection?

Level One: Essential Protection Your first line of advanced support is built on a basic, straightforward foundation that’s easy to implement. Log manager and log review. This analyzes the huge volumes of data in your cloud. You can look for things like performance management, security incident response, and compliance requirements.   Fully managed intrusion detection. […]

Why intrusion detection does not go far enough

Why Intrusion Detection Does Not Go Far Enough

Intrusion Detection Is Not A Cure-All A ransomware attack in early 2016 dubbed “SamSam” was so severe — and, frankly, frightening — that the FBI sent out an alert to watch out for it. The problem was hackers discovered a huge security hole in a popular piece of open-source networking software and used it to […]

Keeping Intruders Out of Your Web Apps

Understand the Key Web App Attack Vectors Start by familiarizing yourself with hackers’ favorite ways into apps, such as: SQL injections Cross-site scripting (XSS) Denial of service (DoS) attacks There are many more, of course, and new ones are being dreamed up every day. Make sure your security team stays abreast of all of these […]

Setting your 2017 IT strategy…in dual speed

Level One of Dual-Speed IT involves a continuous, steady acceleration to support the stability of the organization and operational needs of the core business. This level is internally focused – the traditional enterprise IT that companies like OnX have worked with for many years, designing systems that promote scale and provide availability for their mission […]

5 Top IT Manager Concerns Addressed by a Security Intelligence Appliance

So after completing your research, if you decide Splunk Enterprise Security is the right solution, then you must determine how to get Splunk up and running quickly with the limited time available from your IT staff? Enter the OnX Security Intelligence Appliance. OnX has developed the appliance in partnership with Splunk and Cisco to address […]

IT Security Patching and Vulnerability Management

How best to optimize your IT security patching? It can be useful to first break down patches between those that address functionality or incorrect code in an application/OS, and those which address security. The first requires an understanding of how the applications and operating systems work in concert and, therefore, what new code enhancements may […]

Traditional Backups are not for IT Disaster Recovery

CREDIT UNION GOES TO MANAGED CLOUD FOR TIGHTER SECURITY AND ZERO DATA FOOTPRINT Read the Case Study I like to look at an IT disaster recovery model like the OSI model for networking. At the bottom of the model layers 1-3 would be traditional backups. The middle layers 4-5 would be storage array replication. This […]

Succeed with Every IT Disaster Recovery and Business Recovery Test / Exercise

What IS surprising? Why such mature elements, like IT disaster recovery and business continuity, that are so critical to the continuity of business operations and revenues – and in some instances the overall survival of the business – are in such a sorry state? There are not volumes written on these topics which you can […]

Closing the gap between open-source technologies and enterprise-level IT

Why go with HPE Helion? For starters, it has the full backing of HP Enterprise, one of the biggest names in enterprise IT. But what really matters is how HPE Helion takes advantage of the flexibility, scalability and cost benefits of the OpenStack cloud computing infrastructure, which allows customers to transform their operations into a […]