Best Practices Series: VMware Storage Management Best Practices
Welcome for another blog post in our cyber security best practices series. (more…)
Best Practices Series: Virtual Networking for VMware
Best Practices – A growing number of organizations are now standardizing in a virtualized server deployment and they want to consolidate servers that belong to different trust zones. A trust zone is loosely defined as a network segment within which data flows relatively freely, whereas data flowing in and out of the trust zone is subject to stronger restrictions. The introduction of virtual technology does (more…)
Configuring Log Event Source Series – IBM AIX
Welcome to our first post in the series of configuration instructions in enabling monitored systems to send system logs to a central logging server.
This configuration instruction contains the following information for configuring an IBM AIX event source. The tested platform is based on IBM AIX version 4.x and 5.x (Security and Authentication messages only).
By default, an AIX system will not (more…)
Configuring Log Event Source Series – HP UX
Welcome to another post in the series of configuration instructions in enabling monitored systems to send system logs to a central logging server – HP UX. (more…)
What Is Data Loss Prevention (DLP)?
A quick Google on “Data Loss Prevention Definition” results in the following definition from a couple different sources: (more…)