Sep 13, 2023 | Articles, Articles, Articles, Articles
What is Needed to Move Large Files? Big files need big solutions, or rather solutions capable of reliably and securely moving files in and out of an organization. Instead of relying on free or open-sourced solutions that “might” move a big file, consider your...
Sep 13, 2023 | Uncategorized
Helsinki, Finland – September 7, 2023 – SSH Communications Security extends SSH Zero Trust Suite to a modern, real-time, secure, and audited (who did what when?) human-to-human communications platform. It consists of multiple modules helping people to share private...
Aug 3, 2023 | Uncategorized
Back in the early days of corporate networking, IT departments typically deployed firewalls to keep employees from accessing non-work related content, like social media sites. While content filtering remains part of a firewall’s job, it’s no longer the primary reason...
Aug 2, 2023 | Uncategorized
This is the eleventh part of my syslog-ng tutorial. Last time, we learned about message parsing using syslog-ng. Today, we learn about enriching log messages. You can watch the video or read the text below. YouTube Link: https://youtu.be/tFHyvLgiSyI Enriching...