Quantcast
Channel: TDi
Browsing all 13 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

CIP-005-4 R1 in the IT Foundation

By Pam Johnson CIP-005-4 is focused on Electronic Security Perimeter(s). Section R1 is titled “Electronic Security Perimeter” and is further defined as: Electronic Security Perimeter — The Responsible...

View Article


Image may be NSFW.
Clik here to view.

Security and Accountability with IT Foundation Management

By Pam Johnson I talk a lot about compliance as it relates to NERC-CIP and the Utilities industry, but there are many companies in other industries with large, critical system networks, and they often...

View Article


Image may be NSFW.
Clik here to view.

From Reactive to Proactive

By Terry Schurter While businesses in all industries occasionally experience some growing pains due to the increasing reliance on technology, financial institutions may be one of the most deeply...

View Article

Image may be NSFW.
Clik here to view.

Compliance: Proving the Practice

By Pam Johnson Stringent compliance requirements can be a challenge to meet with limited resources; the problem that many companies face is meeting the necessary requirements while continuing to...

View Article

Image may be NSFW.
Clik here to view.

A Comprehensive Approach to Regulatory Compliance

By Pam Johnson Whether it’s SOX, PCI, NERC-CIP, or HIPAA, organizations are facing more compliance issues than ever before, and the penalties for failing to comply with these regulations can be severe....

View Article


Image may be NSFW.
Clik here to view.

Simplifying Patching Activities with Multi-Connect

By Pam Johnson Patching is an aspect of system maintenance that every business must deal with. Although patching is often considered a routine activity, and a monotonous one at that, mistakes in...

View Article

Image may be NSFW.
Clik here to view.

Event Lifecycle Management – Logging Events

By Pam Johnson Our discussion of Event Lifecycle Management continues with an overview of the logging capabilities of ConsoleWorks. When an event is detected (See my previous article on Event...

View Article

Image may be NSFW.
Clik here to view.

Event Lifecycle Management – Auditing and Reporting on Events

By Pam Johnson The final piece of the Event Lifecycle Management puzzle that I will discuss is event reporting. Reporting on all events is critical to shift changes, compliance, and audit actions....

View Article


Image may be NSFW.
Clik here to view.

Security and Compliance in Virtual Environments

By Tom Kearns The use of Virtual Machines (VMs) in IT introduces a new layer of complexity in the IT infrastructure, and adds new challenges to IT operations, security, and compliance. ConsoleWorks is...

View Article


Image may be NSFW.
Clik here to view.

The ConsoleWorks Difference

By Pam Johnson ConsoleWorks® is the leading IT foundation management solution on the market. The ConsoleWorks Server is the high-performance engine that handles information flow processing, business...

View Article

Image may be NSFW.
Clik here to view.

Improved Baseline Configuration Management with ConsoleWorks 4.7

By Pam Johnson The recent release of ConsoleWorks Version 4.7 includes a number of new and improved features, including new functionality added to ConsoleWorks Privileged Access Management, Monitoring,...

View Article

NERC-CIP Compliance – Audit versus Intent

NERC-CIP compliance is an integral part of the conversation in the Utility industry. Management practices are being continually refined and deployed against it, technology is being implemented because...

View Article

Revisiting How ConsoleWorks Handles Baseline Configuration Management (BCM)...

One element of configuration management is the recording and auditing of the actual configuration files on IT/OT devices. The first time we document the configuration of a device that becomes the...

View Article

Browsing all 13 articles
Browse latest View live