Blog

Tags

Content

Handling security and capacity challenges when working remotely

What should be watched when office network is accessed remotely Current world situation forces many a people to work remotely – e.g., from…

Andrew Mavliev Apr 3, 2020 3 min read

How to create and monitor redundant means to access network

Remote access should not have single point of failure Remote access to intranets and otherwise restricted areas was always a challenge. On one hand,…

Andrew Mavliev Mar 20, 2020 4 min read

Make sure your Web servers support modern security protocols

Prevent security risks related to out-of-date security protocols To make sure no site content is modified or intercepted en route, HTTPS protocol is…

Andrew Mavliev Mar 13, 2020 3 min read

Prevent security issues when monitoring with SNMP family of protocols

Avoid typical pitfalls when using SNMP family of protocols Simple Network Management Protocols, SNMP, refers to protocols family used to probe and…

Andrew Mavliev Mar 6, 2020 4 min read

Intrusion detection techniques: monitor and react to unusual activity

Look for typical traits of upcoming problems Security monitoring is a constantly changing area; the threats can appear at any moment; when there are…

Andrew Mavliev Feb 28, 2020 4 min read

Active response monitoring: first aid for your services

Use alerts to initiate external actions Monitoring is typically viewed as informative service: when a problem arises, messages are being sent, to…

Andrew Mavliev Feb 21, 2020 3 min read