Networks

haproxy

The HAProxy Enterprise WAF

The HAProxy Enterprise WAF with support for ModSecurity rulesets protects your web applications from sophisticated, Layer 7 threats left unhandled by network firewalls. Data breaches. Loss of consumer confidence. An endless cycle of companies being compromised. Not just fly-by-night, sketchy websites either. Large companies—companies that you’d think would do better—are being caught without reliable security measures in place.

stackrox

New Year, Better StackRox: Extending Our Lead in Kubernetes-Native Security

StackRox is continuing to shape the future of Kubernetes by enabling customers to build, deploy and run cloud-native applications at scale securely. In recent months, we have released several new, important features covered in this post, focusing on enhanced detection capabilities and simplified administrative workflows.

Best Practices for Monitoring Your End-User Experience - SolarWinds Lab Episode #94

Knowing if a server has high CPU is helpful, but does it really matter if your end users can still access their apps without performance issues? If you're only monitoring the server side, then you don't have a complete picture of your environment. End-user monitoring can be an extremely valuable tool—if you know how to you use it. Join Product Manager Katie Cole and Head Geek Patrick Hubbard as they dive deep into best practices for Pingdom®, the SaaS-based, end-user experience monitoring tool from SolarWinds.

Is a Freemium Business Model still viable for your company? | Tomorrow's Tech

The digital age has reshaped the 21st-century business landscape in a world of ways. On this episode of Tomorrow’s Tech, Chairman of Opmantek, Danny Maher shares deep insights on why the Freemium business model requires strategic choices that need to be aligned and continuously reviewed to build a sustainable business.
datadog

Monitor Juniper network devices with Datadog

Juniper Networks provides a range of IT network and security devices, including routers, switches, access points, and firewalls. As you scale your on-prem infrastructure with potentially thousands of devices distributed across multiple locations, getting visibility into your entire network can easily become a pain point.

auvik

5 Steps to Configure Cisco AnyConnect VPN

Because the world continues to work from home this year, I’ve had to configure Cisco AnyConnect VPNs on ASA firewalls for clients a few times. Unfortunately, the documentation from Cisco is extremely confusing, and I’ve seen a lot of organizations that do it wrong (by which I mean insecurely). The process itself is quite simple, though, so let’s go through the steps you’ll need to configure Cisco AnyConnect for your VPN.