Explore


10 steps to Cyber Security

The actions and steps described below are in accordance with the guidelines from CESG UK and represent a good foundation for effective information risk management…...

Read More

Endpoint Security and Endpoint Management

TANIUM CORE (Endpoint Security and Endpoint Management ) Ask Know Act  The platform for manageability and security The best endpoint solution in the market today…...

Read More

Amazon IaaS (aws) it is called VPC.

What is a Virtual Private Cloud? If you host it in amazon IaaS (aws) it is called VPC. Logically isolated network Existing within a single…...

Read More

Splunk listens to your data.

Splunk listens to your data. What story are we trying to tell? What visualization that story best? What is the best way to search for…...

Read More

How to setup multi-site Search Head cluster

To deploy a multisite cluster, you configure the set of nodes for each site: A single master resides on one of the sites and controls…...

Read More