Aliso Viejo, CA, USA
Jun 5, 2020   |  By Clay.Jackson
The IoT, Internet of Things, has arrived. Sensors are everywhere, collecting more and more data about us and the world around us. Temperature, Humidity, Fluid Levels, Traffic counts, the status of devices and things like doors and elevators are being collected and distributed all around us. The question now is "What do we do with all that data?
Jun 2, 2020   |  By David Orlandi
Traditionally, DBAs are the ones primarily tasked with maintaining high availability and peak performance of the database environment. Therefore, they assume the responsibility of evaluating Performance Monitoring solutions. This requires identifying the diagnostics needs specific to the environment. With the *DevOps workflow becoming more popular, DBAs and Developers are finding it to be mutually beneficial to find efficient ways to proactively address database performance.
Jun 1, 2020   |  By Amit Parikh
What has become a typical theme in the arena of Information Technology are the concerns around managing costs associated with these systems. Whether it be the capital and operating expenditures associated with the data center, or the ongoing costs associated with everyday management and maintenance, most organizations want better control over what seems to be an ever-growing IT budget.
Apr 24, 2020   |  By Rebecca Hirschfield
If you missed the recent webcast on SQL performance tuning presented by Janis Griffin, you are definitely going to want to watch it on-demand. She packed so much information into 60 minutes, it’s a wonder there weren’t thousands of heads exploding across WebEx – and every nugget of advice was pure gold. Let’s start with Janis’ 30+ year career as a DBA across multiple platforms, especially Oracle and SQL Server. She knows her stuff and knows how to talk about it.
Apr 15, 2020   |  By Darren Mallette
We were recently asked if Foglight can be used to monitor Google Cloud SQL instances, specifically MySQL, PostgreSQL and SQL Server. To clarify, these are the PaaS (or DBaaS) offerings from Google. Within Google Cloud Platform, you can use Compute Engine virtual machines and monitor the databases and OS's on those like you normally would with Foglight. The answer from our testing is that it "more-or-less" works.. This is not an official support endorsement however. That remains TBD.
Sep 24, 2018   |  By Quest
Keeping users happy and boosting IT productivity is easier than you think when you have an effective service desk tool. Read this white paper to discover the ten key features to look for in a service desk solution.
Sep 24, 2018   |  By Quest
Most cyberattacks today begin on user workstations. Why? Well, in part it’s because workstations, unlike servers, are typically the province of non-technical users, who are easier prey for attackers. It’s easy to lay all the blame on users, but attacks are getting more sophisticated all the time. The other side of the coin is that users’ workstations are also particularly vulnerable, for several reasons.
Sep 1, 2018   |  By Quest
Complete, reliable user activity tracking is essential to both security and compliance. But using native tools means struggling with an avalanche of uncorrelated, cryptic event activity from individual DCs, servers and more, and most third-party tools are cumbersome to implement and don’t provide the depth of auditing required.
Sep 1, 2018   |  By Quest
Too many organizations today spend millions of dollars fortifying their perimeters to keep attackers out of their network, but fail to pay sufficient attention to the malicious users already inside. In fact, insider threats actually represent 60% of all cyber security attacks, so they can’t just be ignored.
Aug 1, 2018   |  By Quest
Endpoint management has become more complex. Besides deploying and maintaining a growing range of devices, IT administrators also need to continually meet compliance standards and protect their organization’s network.
Jun 17, 2020   |  By Quest
Listen in as Quest product experts Ghazwan Khairi, Bryan Patton and Robert Tovar discuss how InTrust seamlessly integrates with your SIEM solutions for real-time security analytics and lower annual SIEM costs.
Jun 3, 2020   |  By Quest
Learn how how to apply security configurations to your Office 365 deployment to address the CISA O365 security alert.
Jun 2, 2020   |  By Quest
Discover how to search and alert on suspicious logon activity in your AD, Office and hybrid environment with the On Demand Audit Hybrid Suite.
Jun 1, 2020   |  By Quest
Learn how you can prepare for – and recover from – a destructive attack on your Active Directory.