Read the latest blog posts
    • 19 Jun 2017

    Active Directory management and security breaches – What changed and who changed it?

    If your Active Directory objects aren’t constantly changing, then something is probably wrong with your company. There’s a continuous process of creating, modifying and deleting almost everything in a normal organization, like users, shares, group memberships, policies, resources and computers. Worse than all the changes is the nagging likelihood of an AD audit, when an auditor will walk up to your desk...
    • 16 Jun 2017

    Supercharging performance of your virtual infrastructure

    In our last post, Reducing virtual infrastructure costs while supercharging performance is possible , we discussed how IT professionals are often limited to either reducing cost, minimizing risk or improving service. But there are solutions that can help you take advantage of all three options. We delved deeper into how such a solution would help you reduce the costs of your virtual infrastructure . This time, we look...
    • 16 Jun 2017

    Log management and security breaches – What’s the best way to search through a zillion event logs?

    “That security breach didn’t happen by magic,” your boss growls. “Someone had privileges they shouldn’t have had and they got unauthorized access to a file or folder. Check all the logs and find out what happened.” “Whew,” you say after your boss leaves your office. “At least I don’t have magic to contend with.” Your boss is right, though. Somewhere...
    • 15 Jun 2017

    Announcing SharePlex 9.0, the next major release. What’s in it for you?

    In a 2017 survey, we asked our customers what database technologies power their most important applications — you know, the biggies: finance, CRM, HR and so forth. It’s no surprise that Oracle and SQL Server were the top two. What’s telling, in a survey of over 250 unique organizations, is that 70 percent of the time, it’s Oracle and SQL Server databases that power their most critical applications...
    • 15 Jun 2017

    Use Cases for IT Forensics – Deep Investigation into Your Windows Environment

    “Which files and folders can Dave in Tech Support modify?” “HR just gave us a heads-up on these former employees. Find out which servers they had access to.” “Check to see who changed permissions on any of the folders in Marketing in the last 24 hours.” “Ravi says he’s lost cloud access. See what’s going on.” Do you like responding to IT issues like these...