E911 Network Compliance Headaches? Solution: Network Diagrams.
By Fred Koh - November 7, 2023Campus safety – whether it’s a corporate complex, a hospital campus, a hotel, entertainment venue, or a college campus – is crucial. Add in liability issues and various laws (Ray Baum’s Act, Kari’s Law) and campus safety in IT goes beyond just keeping the network up and running – now it’s about knowing what you…
Learn MoreHow Does Network Discovery Help Prevent Cyberattacks?
By Fred Koh - September 30, 2020Over the years, we’ve written extensively about zombie servers, cables that aren’t fully decommissioned, and much more. If we had to sum all that up into just one sentence, it would probably be something like this: IT documentation helps you find resources that are drawing power but not performing any functions. Just as technology and…
Learn MoreIT Audit? Software Helps
By Fred Koh - September 22, 2020From time to time, when I ask a company why they are looking for network diagram and documentation software such as netTerrain, they say it’s because they just acquired another company and have no idea what’s on their network and what assets the other company has. If you are considering acquiring a company, ask the…
Learn MoreGDPR Compliance? How netTerrain Helps
By Jan Durnhofer - November 15, 2019Recently, a customer asked us about the EU’s General Data Protection Regulation (GDPR) in the context of his netTerrain documentation. Is netTerrain compliant, and can netTerrain help European Union (EU) organizations get/stay compliant? GDPR and Compliance GDPR is a new regulation that, among other things, expects an organization to meet certain standards for your network…
Learn MoreHow Network Diagrams Help You Secure the Network
By Jason Sherman - August 6, 2019Just as the Equinox data breach seems to finally be on its way to being settled, Capital One gets hit with a massive data breach. In 2019, data is no longer just personal information: it’s a commodity that hackers want to steal and sell. For companies who are entrusted with keeping any kind of personal…
Learn MoreHow DCIM Software Improves Data Center Security
By Fred Koh - April 1, 2019My colleague Jan Durnhofer wrote an article about how to secure your DCIM solution from security attacks (click here to read it). Continuing the discussion around DCIM and security, I’d like to discuss another key aspect of security for your data center: how DCIM can help managers secure the data center from within the organization….
Learn MoreOctober is National Cyber Security Month: Why Network Diagrams Matter
By Fred Koh - October 15, 2018Ah, October. Falling leaves, changing colors, a chill in the air (all dependant upon where you live, of course), and of course, the ubiquitous pumpkin spice in everything. Less well known, but not any less important, is that October is National Cybersecurity Awareness Month. National Cyber Security Awareness Month (NCSAM) dates back to 2004, an…
Learn MoreTo Reduce Cybersecurity Risks, You Need to Know What’s In The Network
By Jason Sherman - August 2, 2018Exciting developments at foot in the world of cyber security: the National Institute of Standards and Technology has developed the Cybersecurity Framework, which is a voluntary framework with standards, guidelines, and practices for managing (and mitigating) cybersecurity risks. If you haven’t heard about it, here’s the Cliff Notes version: The Cybersecurity Framework began back in…
Learn MoreIf You Can’t Answer These Questions, Your Network Isn’t Secure
By Jason Sherman - October 6, 2017Coming soon to a movie theatre near you: NETWORK SECURITY….THE MOVIE. It’s going to be a real blockbuster: full of action, thrills, daredevil maneuvers by network engineers who try to save everything at the last minute, and, of course, hackers. Ok. Maybe we’ll have to wait a bit on the movie, but who needs the…
Learn MoreSecurity & DCIM: Your Questions Answered by DCIM Experts
By Jan Durnhofer - May 23, 2017Reports of cyber attacks are widespread today: data shows that both the size and frequency of these attacks are on the rise. For those who use or are considering using DCIM software, these attacks beg the question, “Is DCIM susceptible? What kind of attacks can be waged against a DCIM solution?” All software, online or…
Learn MoreDoes Your Network Have a Security Blanket?
By Jason Sherman - September 4, 2015Sometimes, after a long day, I just need to curl up with a nice blanket on a cold and stormy night to help feel extra secure. Of course, my pit bull helps, as well. Occasionally, whether it’s an actual blanket or something else, we all need that feeling of comfort. Do I ever wake up…
Learn More