Downloads

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive
Learn more about how the RSA SecurID Suite is the most actionable insight to protect enterprises and minimize the friction that users face, empowering businesses to get more done, and request a trial today!

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive
Eliminate performance bottlenecks, improve application service and reduce overall cost of database operations with SolarWinds® Database Performance Analyzer (DPA) -- a comprehensive SQL performance monitoring and analysis solution for DBAs, IT managers, and application developers. DPA monitors SQL Server®, Oracle®, SAP® ASE, & DB2 across your entire environment including physical servers, virtualized environments and in the Cloud.

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive
These files demonstrate the technique described in the article How to improve functionality by removing blank cells from an Excel sheet.

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive
Your organization may have a secure IT infrastructure, but third parties can make it vulnerable to breaches, which often result in corporate data theft, brand damage and hefty government fines.
However, third party security assessments often pose a challenge because they are traditionally implemented via emailed risk assessment surveys and Excel spreadsheets.
Download this whitepaper to learn how cloud-based, automated risk assessments of third parties and internal staff help you streamline the entire lifecycle.

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive
As the mobile enterprise expands, companies face the mounting complexity of keeping their assets safe from attack. This guide looks at trends in mobility management, areas of risk, and new tools for securing mobile devices.

Topics covered in this ebook include:
  • BYOD, EMM, and new security approaches
  • Best practices for managing security on BYOD phones and tablets
  • The value of mobile threat intelligence
  • Mobile device security myths
  • Vulnerabilities in mobile health and finance apps
  • The relative security of Android and iOS devices
In his introduction, ZDNet’s Charles McLellan offers this overview:

Mobile devices are a particular headache for IT security professionals because they present a bigger attack surface than PCs residing (relatively) safely within the corporate firewall, for several reasons: Mobile devices can be lost or stolen; mobile operating systems generally have less enterprise manageability heritage than desktop OSs; and wireless communications—be they Wi-Fi or cellular—can be intercepted.

Overlaying all this is the BYOD issue: Many organisations allow employees to use their own smartphones, tablets, and laptops to access company resources, whereupon the security of this heterogeneous population of endpoints becomes the IT department’s responsibility.

As the enterprise has become more mobile, a whole industry, initially focusing on mobile device management (MDM) and subsequently broadened to encompass enterprise mobility management (EMM), has grown up to address these issues. But security breaches continue to make the news almost daily, and the mobile enterprise continues to evolve with wearables and other IoT devices plugging into enterprise networks and ever more workloads and data being deployed in the cloud.

My Tweets

Last Articles

Top 5 decentralized social networks

Facebook and Twitter are undeniably popular, but they're not the only social media platforms to...

Top 5 decentralized social networks

Facebook and Twitter are undeniably popular, but they're not the only social media platforms to...

How to create a virtual desktop in macOS

macOS users are in luck as the platform includes virtual desktops. Find out how these can help you...

Want to learn the fastest-growing programming languages of 2019? Check out these two unstoppable newcomers

JavaScript spin-off TypeScript and Java sibling Kotlin once again race up the RedMonk Programming...

How to recruit and retain developers

Developers are a smart, picky bunch. If you're hoping to attract and retain top engineering...

How to access your Android phone's texts and photos in Windows 10

You can view photos and text messages from your Android device directly in Windows 10. Follow...

Microsoft reanimates corpse of maligned Office Assistant "Clippy" to help Teams compete with Slack

The paperclip that everybody loves to hate is back as a sticker for Microsoft Teams, Redmond's...

Vulnerability in SoftNAS Cloud allows attackers to bypass authentication

The vulnerability allows attackers to run arbitrary commands as root, which clearly undermines the...

Java 12: What's new in the latest version of the programming language?

The latest release of the language promises a few notable improvements and is available to...

How to add 'Move to' and 'Copy to' to the context menu in Windows 10

Microsoft does not include "Copy to" and "Move to" by default in the Windows Explorer context...

  • Top 5 decentralized social networks

    Thursday, 21 March 2019 21:30
  • Top 5 decentralized social networks

    Thursday, 21 March 2019 21:30
  • How to create a virtual desktop in macOS

    Thursday, 21 March 2019 20:30
  • Want to learn the fastest-growing programming languages of 2019? Check out these two unstoppable...

    Thursday, 21 March 2019 13:30
  • How to recruit and retain developers

    Thursday, 21 March 2019 06:30
  • How to access your Android phone's texts and photos in Windows 10

    Wednesday, 20 March 2019 21:30
  • Microsoft reanimates corpse of maligned Office Assistant "Clippy" to help Teams compete with Slack

    Wednesday, 20 March 2019 17:30
  • Vulnerability in SoftNAS Cloud allows attackers to bypass authentication

    Wednesday, 20 March 2019 15:30
  • Java 12: What's new in the latest version of the programming language?

    Wednesday, 20 March 2019 14:30
  • How to add 'Move to' and 'Copy to' to the context menu in Windows 10

    Tuesday, 19 March 2019 16:30