Latest Publications

How Flowmon Can Help You Control Your Network

The patterns of network traffic are changing. Due to global health concerns, face-to-face contact is discouraged and home office has become a necessity, creating new challenges for network monitoring. The sudden global trend of working from home poses dilemmas for network administrators. Do they increase the company bandwidth or change Internet communications policy? In what way have network traffic characteristics changed and what does it mean for you?

Three Major Trends Impacting Healthcare Customer Experience

Customer Experience (CX) in healthcare can feel like an afterthought, or not thought of at all. As customers gain further choices across the board about their healthcare options, organizations must respond with a higher standard of service for patients, members, and providers. Healthcare organizations must face CX head-on, ensuring customers receive the service they deserve and representatives have the solutions they need to deliver quality CX.

Dods Research: Government Digital Transformation in a Post-COVID World

Governments are facing unprecedented levels of uncertainty due to the COVID-19 pandemic. CIOs must identify and act upon digital government strategies and plans that can lead to future positive outcomes regardless of the uncertainty. But what are the biggest factors affecting digital transformation across government? And to what extent has COVID-19 affected digital government efforts?

DIY Guide to Open Source Vulnerability Management

You've realized you need to do a better job of tracking and managing your open source as well as the vulnerabilities and licenses associated with it. How hard can vulnerability management be? Do you really need special tools? After all, the license and vulnerability information is publicly available. Once you get a list of open source components and do some Google searching, you should be all set, right?

The 5 Biggest Security Operations Trends Shaping Today's MSSP

While opportunity has never looked brighter for MSSPs, they are still under obligation to solve the very security challenges so many enterprises and SMBs count on them for, all while recognizing that each client environment requires unique attention. This is no easy feat, especially as competition grows and customer expectations become more exacting.

10 AWS Best Security Practices Guide

More and more companies choose to migrate to a Cloud infrastructure to take advantage of new resources, an elastic storage power and agile deployment, nevertheless IT professionals are not always trained to secure these new technologies. Like traditional infrastructures, a public Cloud infrastructure services requires the implementation of security measures and controls by their users. Enterprises must adapt their security policy to these new technologies to reap the Cloud benefits without increasing their cyberattacks exposure area.