Loading...
Blog2023-01-19T20:41:37+00:00

Automating Security at the Endpoint

Sophisticated cyberattacks which target the endpoint continue to be a major threat, and a significant risk. Ponemon reports that 68% of IT and security professionals said the frequency of cyberattacks [...]

By |March 11th, 2021|Categories: Blog|Tags: , , |Comments Off on Automating Security at the Endpoint

Strategy & Factory Pattern in Spring Boot Application: Part II

Strategy and Factory patterns are the most useful design patterns in any application. If you have a branching code with lots of ‘if and else’, then Strategy pattern is the [...]

By |January 24th, 2021|Categories: Blog|Tags: , |Comments Off on Strategy & Factory Pattern in Spring Boot Application: Part II

Strategy & Factory Patterns in Spring Boot Application: Part I

Strategy and Factory patterns are the most useful design patterns in any application. If you have a branching code with lots of ‘if and else’, then the Strategy pattern is [...]

By |January 22nd, 2021|Categories: Blog|Tags: , , |Comments Off on Strategy & Factory Patterns in Spring Boot Application: Part I

5 Ways to Reduce Network Costs

As companies strive to control costs, networking teams must be ready to respond to calls for reductions. Unfortunately, network costs are traditionally considered tough to trim. After all, expensive single-manufacturer [...]

By |December 22nd, 2020|Categories: Blog|Tags: , , |Comments Off on 5 Ways to Reduce Network Costs

Migrating a VMware MS SQL Cluster with RDM Disks

When migrating your VMware environment to a new SAN or storage provider, edge cases often require special attention. One such case involves virtual machines with Raw Device Mapped (RDM) LUNs. [...]

By |June 20th, 2020|Categories: Blog|Tags: , , |Comments Off on Migrating a VMware MS SQL Cluster with RDM Disks

Risk Assessment Can Protect Your Data and Business

Your business data is threatened by many types of risk – everything from natural disasters, data center outages, breaches by hackers, and even disgruntled employees. Mitigating the risk of data [...]

By |March 22nd, 2020|Categories: Blog|Tags: , , |Comments Off on Risk Assessment Can Protect Your Data and Business

7 Key Tools for Network Security Teams Battling Cyber Threats

(and they don’t get in the way of business either) The elevated levels of cyber threat activity that now occur on a daily basis are leading most network security teams [...]

By |January 15th, 2020|Categories: Blog|Tags: , , |Comments Off on 7 Key Tools for Network Security Teams Battling Cyber Threats
Go to Top