Change & Configuration Management Articles
Read articles from industry experts New Net Technologies to find out about best practices in keeping your IT systems secure.
Change Control has always been a key security best practice. With every change made to IT systems comes a risk of a weakening of security defenses, not to mention operational problems, through misconfigurations.
With just a few weeks left of National Cyber Security Awareness month, this is a great time for organizations of all sizes to take a good look at their security posture and consider what can be done to strengthen your IT environment.
According to a recent report by the Office of the Inspector General, the Department of Homeland Security still has a lot of work to do when it comes to the agency’s cyber security posture.
This final article in the series of 3 focuses on one of the key security best practices that is usually the hardest to implement, one requiring wholesale organizational and cultural change within the IT Team: Change Management.
Is a gun better than a knife? I've been trying hard for an analogy, but this one kind of works. Which is better? A gun or a knife? Both will help defend you against an attacker. A gun may be better than a knife if you are under attack from a big group of attackers running at you, but without ammunition, you are left defenseless. The knife works without ammunition and always provides a consistent deterrent, so in some respects, gives better protection than a gun.
Change Tracker Gen 7R2: Complete configuration and system integrity assurance combined with the most comprehensive and intelligent change control solution available.
Vulnerability Tracker: The world’s only limitless and unrestricted vulnerability scanning solution with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.