IT Management

September 6, 2016
Forget Everything You’ve Read about Application Monitoring premium
If you’re like many federal IT professionals, your understanding of application performance management (APM) has probably been rigidly shaped by the limited definitions put forth by analysts and other industry experts. Those groups tend to place APM in a very narrow, easily consumable box. To them, it’s software that incorporates analytics, end-user experience monitoring, and […]
premium
March 20, 2015
Three Strategies for Fighting the Growing Issue of Insider Threats premium
By Chris LaPoint, VP of Product Management, SolarWinds Altruistic hackers are slowly becoming more prominent in pop culture, specifically in TV shows in which they are young geniuses using their skills to help those in need. Their derring-do involves taking control of everything from airplanes to traffic signals, all in the name of good. And […]
premium
paul.kim@dlt.com'
February 21, 2013
SolarWinds Survey Finds Complexity & Data Loss Are Major Cybersecurity Concerns premium
SolarWinds, a leading provider of powerful and affordable IT management software, recently released the results of their 2013 SolarWinds Security and Compliance Survey. Over 160 IT professionals were polled and their answers revealed fears about the present and future, on both cybersecurity and the influx of new technology.
premium
josh.davis@dlt.com'
October 11, 2012
You’re Sinking My IT Ship: Why Continually Treating IT Like a Battleship is a Problem premium
Government IT has been characterized by long term monolithic systems that fail to deliver. Part of the problem is approaching IT as a complex durable good, like a battleship, with complete specifications, known life-cycles, and defined missions. Fighter aircraft have six generations of evolving technology and missions, each having known maintenance cycles, life spans, and changing requirements based on future planning and doctrine, as well as, mission feedback. IT has none of that because it has no duty cycle or doctrine. IT can be obsolete on delivery, regardless of development timeframe. IT delivery can redefine all previous requirements. IT has very little longevity, even if successful on delivery.
premium
Solutions Architect, DLT
April 10, 2012
Access control challenges are cloud’s nemesis premium
This year’s RSA conference was a deluge of technology centered on the usual security suspects with an addition of recent year themes surrounding the challenges of cloud computing. Two years ago the conference was all about cloud, last year it was “Bob and Alice” (the challenges of compliance vs. defection surrounding lack of trust in cyberspace).This year’s “Mightier than the Sword” theme was the next logical step towards cyber warfare. After all, regardless of the strength of security controls, the presence of global information availability coupled with the absence of trust inevitably tends toward war. Perhaps it is time to work on this “trust” problem. After all, it’s all about risk… right?
premium
terry.freeman@dlt.com'
April 13, 2011
Keeping Enterprise IT Systems Secure premium
“Good security doesn’t stop with just an anti-virus client and a perimeter firewall.” Government Security News (GSN) recently published an article written by DLT Engineer, Aaron Payne, about bringing “Security back to the basics: Managing the threat” that addresses the concern that there are many layers necessary to keeping enterprise IT systems secure.
premium
francesca.krylowicz@dlt.com'
February 23, 2010
Windows 7 and Fed IT: When, and how, will the great migration begin? premium
With Windows 7 being implemented across the world, initial reviews coming in have been positive for the latest Microsoft Operating System.   Much like 2000 was to NT, and XP was to, dare I mention, ME, Windows 7 is a huge improvement from the Apple’ish OS of Vista. While Vista was not terrible, most scorned Fed […]
premium
blogs@dlt.com'
February 4, 2010
Symantec and Gideon Technologies Acquisition – A natural IT Management software combination premium
Last week Symantec announced it had signed a definitive agreement to acquire privately-held Gideon Technologies, Inc. Gideon Technologies should fit well in the Symantec security suite, judging by initial press releases and Web feeds based on the two technologies.
premium
blogs@dlt.com'