• Scholarship Winner!

    Scholarship Winner!

    We are happy to announce a winner for our Power Admin Network Technology Scholarship!   Julian Miyata did a great job with his video.  You can see it here:   Congratulations Julian!  

  • Monitor (Failed) User Logins in Active Directory

    Monitor (Failed) User Logins in Active Directory

    Everyone knows you need to protect against hackers.  How do you protect your computers from hackers?  One way is to monitor for lots of failed login attempts.  But how do you do that?   With Windows, you watch the Security Event Log – there are many, many events related to users logging in, failing to […]

  • Application Monitoring Beyond The Data Center

    Application Monitoring Beyond The Data Center

    The closed environment of a traditional on-premises data center with hardware and software owned and controlled by the enterprise is now a thing of the past. Private, public and hybrid cloud deployments are empowering organizations to use the resources and capabilities of the cloud to drive business efficiency, self-service on demand, resource pooling, enhanced data […]

  • How Cyber Attacks Affect Us

    How Cyber Attacks Affect Us

    Another nice infographic from Utica College. .   Source: Utica College Cyber Security

  • Micro-Segmentation Best Practices

    Micro-Segmentation Best Practices

    With the growth of software-defined networking (SDN) and the evolution of software-defined data center (SDDC) technologies, network administrators, data center operators and security officers are increasingly looking to micro-segmentation, for enhanced and more flexible network security.   In this article, we’ll be considering the nature and characteristics of the process, and looking at ways to […]

  • Have you tried Dynamic Server Lists?

    Have you tried Dynamic Server Lists?

    Have you tried the Dynamic Server List monitor?  If not, you’re missing out on a powerful feature!   The Dynamic Server List monitor can be run as a Global Monitor, from Advanced Services > Global Monitors.  It lets you create a list based on a large number of possible criteria, such as:   • Does the server […]

  • Cyber Security Career Options

    Cyber Security Career Options

    The folks over at Utica College have put together a great infographic that we wanted to share. Source: Utica College Cyber Security

  • Strategies For Managing Co-Location

    Strategies For Managing Co-Location

    Outfitting, maintaining and managing a data center can be an expensive, time-consuming and labor-intensive process – one which may be beyond the budgetary or human resources of smaller-scale enterprises. In other instances, an organization’s data management and processing needs may not warrant the investment in a full-blown data center of their own.   For circumstances […]

  • Reducing The Stress Of Data Migration

    Reducing The Stress Of Data Migration

    Life is never static, and for businesses the occasional relocation of data archives, mission-critical applications, infrastructure and services may prove necessary. It can be a complex and at times risky endeavor. There are ways to make the process less stressful, and to reduce the potential for such migrations to be costly, disruptive, or in some […]

  • Enterprise Encryption Best Practices

    Enterprise Encryption Best Practices

    Whether it’s to safeguard internal protocols and hierarchies, or to guard against attacks and data breaches in the escalating scale of current cyber-threats, implementing controls on the way information is transmitted and shared is more crucial to the enterprise than ever. Encryption has been and remains an essential aspect of this process. But how best […]

Got any book recommendations?