Virtualization Technology News and Information
White Papers
RSS
White Papers Search Results
Showing 1 - 6 of 6 white papers, page 1 of 1.
Virtualization Monitoring 101
Virtualization has existed since the 1960s, but it wasn’t until the mid-2000s that it really caught on. There is much the average IT practitioner doesn’t know or misunderstands about virtualization. This eBook is designed to discuss virtualization realities from the age-old debate of on-prem vs. cloud vs. hybrid (Spoiler… nearly everyone is hybrid) to newer technology like containers. No matter your level of IT experience, you will find perspective to take away with you.

Virtualization Monitoring 101 was written to provide you with virtually everything you need to know about monitoring VMs, container, the cloud, and more.

It’s designed to discuss virtualization realities from the age-old debate of on-prem vs. cloud vs. hybrid to newer technology like container orchestration. Whether you are a humble sysadmin, network engineer, or even monitoring specialist attempting to monitor these things for the first time; or you’re more involved in a focused project including one or more of these technologies, this FREE eBook offers context, perspective, and actionable lessons to help you.

Topics covered include:

  • Inventory in the age of orchestration
  • Moving from on-prem to cloud
  • What matters in different environments
  • The most vivid “franken-duck” explanation of how cloud works ever written
Safeguarding Your Business in the Digital Age
With threats from cybercrime on the rise, improving the security posture of your business is crucial. Download this white paper to review the current threat landscape, the cost of cybercrime, and what you can do to protect your business without putting stress on your bottom line.
Organizations are facing increasing threats from cybercrime, and it’s only getting worse as criminals get more sophisticated and data increases exponentially. In fact, there has been a 300% increase in reported cybercrimes in just the last two years alone.

When you consider that hackers only have to succeed once to spell disaster for your entire enterprise, it’s more important than ever to put a solid, multi-layered security strategy into place to protect your organization.

But where do you start? Hiring an experienced cybersecurity team is expensive at best, and impossible at worst. In this white paper, we look at the increased threats, the cost of cybercrime, and what you can do to protect your business without putting stress on your bottom line.
Weak Password Report - 2023
This year’s Weak Password Report highlights why passwords are still the weakest link in an organization’s network, and how stronger password policy enforcement can be your best defense. The 2023 password report unveils keys themes in password creation like the fact that 88% of passwords used in attacks were 12 characters or less. Download the report to uncover information from an analysis of 800 million breached passwords and passwords found in live attacks on our team’s honeypot network.

This year’s Weak Password Report highlights why passwords are still the weakest link in an organization’s network, and how stronger password policy enforcement can be your best defense.

The 2023 password report unveils keys themes in password creation that include:

  • ‘Soccer’ tops the related terms list with over 140,000 inclusions
  • Top 10 base words from the Nvidia breach
  • 88% of passwords used in attacks were 12 characters or less
  • The most common base term found in passwords used to attack networks across multiple ports is still password

Download the report to uncover information from an analysis of 800 million breached passwords and passwords found in live attacks on our team’s honeypot network.

5 Ways to Strengthen your Active Directory Password Policy
Microsoft Active Directory (AD) is arguably the most common identity and access management platform in today’s enterprise and as a result, a prime target for cyber-attacks. Microsoft Active Directory is used in approximately 90% of the Global Fortune 1000 companies as the primary means of authentication and authorization to resources. This statistical picture holds true in the SMB market as well. As a result, most organizations today use Active Directory to implement their password security and

Microsoft Active Directory (AD) is arguably the most common identity and access management platform in today’s enterprise and as a result, a prime target for cyber-attacks. Microsoft Active Directory is used in approximately 90% of the Global Fortune 1000 companies as the primary means of authentication and authorization to resources. This statistical picture holds true in the SMB market as well. As a result, most organizations today use Active Directory to implement their password security and password policies.

Active Directory, by default, contains the ability to create basic password policies. Are these enough to protect your organization from attackers? In this comprehensive guide we look at five ways to strengthen your existing Active Directory Password Policy and explore additional solutions available to ensure complete confidence in your first line of defense.

Let's look closer at native Active Directory password settings and see which settings are found in the default password policies businesses use with Active Directory. Download the whitepaper to learn the five ways to strengthen your Active Directory Password Policy.

Self-service password reset and remote work
Remote and hybrid work environments mean IT Service Desks have a new set of complex challenges to navigate while maintaining a trusted level of security. Navigate the IT service desk in a remote & hybrid work environment more efficiently.

Remote and hybrid work environments mean IT Service Desks have a new set of complex challenges to navigate while maintaining a trusted level of security. Navigate the IT service desk in a remote & hybrid work environment more efficiently.

We examine the common driver for Service Desk tickets including network access, cached credentials workarounds, and password resets. All of which can present unique cyber-security challenges that require change for increased efficiency, productivity and security.

Download the whitepaper to learn what the Specops Software cybersecurity team recommends increasing efficiency without sacrificing security.

Password Reset Calls Are Costing Your Organization Big Money
This whitepaper examines the challenges the help desk faces, especially with the prevalence of remote and hybrid work environments. The help desk has multiple workarounds and password resets to handle daily. On top of that there is the evolving landscape of unique cybersecurity challenges in a remote or hybrid-remote workforce that requires help desk staff to be extremely vigilant. See how your help desk can be seeing time and cost savings with a decrease in password resets, providing them with
This whitepaper examines the challenges the help desk faces, especially with the prevalence of remote and hybrid work environments. The help desk has multiple workarounds and password resets to handle daily. On top of that there is the evolving landscape of unique cybersecurity challenges in a remote or hybrid-remote workforce that requires help desk staff to be extremely vigilant. See how your help desk can be seeing time and cost savings with a decrease in password resets, providing them with an increased focus on the more complex problems.