Securing Trust with Securaze Geo-Location Solution

Securing Trust with Securaze Geo-Location Solution

Do your customers request proof of where their devices have been erased? Do they want confirmation that their devices and confidential data have not left the country or ended up in the wrong hands? Are they looking for proof that all aspects of your contract have been...
8 ways to secure your Active Directory environment

8 ways to secure your Active Directory environment

Taking the right steps to secure your Active Directory (AD) has never been more important. Because AD controls who can get into your network and what they can do once they’re inside, failure to implement proper controls will dramatically increase your risk of costly...
Syslog-ng 101, part 8: Macros and templates

Syslog-ng 101, part 8: Macros and templates

This is the eighth part of my syslog-ng tutorial. Last time, we learned about network logging. Today, we learn about syslog-ng macros and templates. At the end of the session, we will know how to do a simple log rotation using macros. You can watch the video or read...