First Kaseya, SolarWinds and now Zabbix…
After the Kaseya hack, then the SolarWinds hack, now it’s Zabbix’s turn. Vulnerable By Design I call these kinds of
Lees meerAfter the Kaseya hack, then the SolarWinds hack, now it’s Zabbix’s turn. Vulnerable By Design I call these kinds of
Lees meerIf I have fiberglass, yes, then I’m ready and the party can start! Ever heard of latency? If you buy
Lees meerThe physical layer is the first (bottom) layer of the OSI model. This includes all physical cabling that hangs between
Lees meerIn IT management there is always a need for a presentation mechanism. So that at a glance you can see
Lees meerThis new version of TSMS creates more overview, has more functionalities and a greater user-friendliness in the dashboard and TSMS
Lees meerThe Event Log is a great invention. All it takes is to monitor the complete event log in real time
Lees meerManaged Services is transferring IT activities to a Managed Service Provider (MSP) with the aim of higher efficiency and lower
Lees meerNewsletter April 2020 Monitoring your IT network is essential, but how do you avoid getting bogged down in too many
Lees meerCommunication is essential in an IT network. Access to your data and internet 24×7 is crucial in the current time.
Lees meerFree! The Dutch are known and notorious for it. Giftbags, we love it. It’s free? Then give it along. But
Lees meer