Go to...
Services
Vigilant Cyber Services
Methodologies and Regulations
Training
Physical Assessments
Cyber Forensics
Virtual Assessments
Whitepapers
Disaster Recovery
Disaster Recovery Services
Off-Site Storage & Servers
Business Continuity
Infrastructure Assessment
Cloud Engineering
Virtualization
Cloud Solutions
EMR Hosting
Remote Desktops
Exchange Hosting
Application Dedicated Servers
Cloud Computing
CoLocation
ESX Hosting
Government Sector
Portfolio
Resources
News
Tools
Blogs
Contact
Site
Web
Search
Services
Vigilant Cyber Services
Methodologies and Regulations
Training
Physical Assessments
Cyber Forensics
Virtual Assessments
Whitepapers
Disaster Recovery
Disaster Recovery Services
Off-Site Storage & Servers
Business Continuity
Infrastructure Assessment
Cloud Engineering
Virtualization
Cloud Solutions
EMR Hosting
Remote Desktops
Exchange Hosting
Application Dedicated Servers
Cloud Computing
CoLocation
ESX Hosting
Government Sector
Portfolio
Resources
News
Tools
Blogs
Contact
Site
Web
Search
November 2021 (1)
October 2021 (1)
September 2021 (1)
August 2021 (1)
July 2021 (1)
April 2021 (2)
March 2021 (1)
January 2021 (1)
August 2020 (1)
July 2020 (2)
June 2020 (1)
May 2020 (1)
March 2020 (2)
February 2020 (1)
January 2020 (1)
December 2019 (2)
November 2019 (5)
October 2019 (1)
September 2019 (2)
August 2019 (1)
June 2019 (1)
May 2019 (1)
April 2019 (1)
March 2019 (1)
February 2019 (1)
November 2018 (1)
September 2018 (4)
August 2018 (2)
July 2018 (9)
June 2018 (4)
May 2018 (2)
February 2018 (2)
December 2017 (2)
November 2017 (2)
October 2017 (1)
July 2017 (2)
June 2017 (1)
January 2017 (3)
December 2016 (1)
November 2016 (2)
July 2016 (1)
April 2015 (1)
November 2014 (4)
October 2014 (2)
August 2014 (1)
June 2014 (1)
March 2014 (1)
January 2014 (1)
December 2013 (1)
November 2013 (1)
July 2013 (3)
June 2013 (7)
April 2013 (1)
February 2013 (6)
January 2013 (6)
December 2012 (8)
November 2012 (10)
October 2012 (2)
September 2012 (11)
July 2012 (2)
June 2012 (1)
May 2012 (1)
February 2012 (2)
November 2011 (1)
August 2011 (1)
December 2010 (1)
November 2010 (1)
May 2010 (4)
July 2009 (2)
June 2009 (1)
March 2009 (2)
November 2008 (1)
October 2008 (1)
September 2008 (5)
July 2008 (2)
June 2008 (2)
May 2008 (1)
December 2007 (1)
November 2007 (3)
September 2007 (2)
August 2007 (6)
March 2007 (1)
June 2005 (1)
May 2005 (1)
Events
Current Articles
|
Archives
|
Search
27
Bluetooth Flaw
Sydney Gonzalez
posted on July 27, 2018 09:18
A cryptographic bug in many Bluetooth firmware and operating system drivers could allow an attacker within only 30 meters to capture and decrypt data ...
[Read the rest of this article...]
Actions:
E-mail
|
Permalink
|
Comments (1)
24
Vigilant implements recovery solution that is immune to ransomware attacks in the public sector
CIO
posted on July 24, 2018 14:27
Ransomware attackers have gotten pretty smart. Some of the earlier ransomware variants would encrypt files on the server, making t...
[Read the rest of this article...]
Actions:
E-mail
|
Permalink
|
Comments (2)
05
NIST Security Ops Whitepaper
Jason Mcgee
posted on July 05, 2018 10:40
Overview The objective of this white paper is to provide a cliff’s note guide to meeting FISMA guidelines as outlined in NIST SP 800-53. This...
[Read the rest of this article...]
Actions:
E-mail
|
Permalink
|
Comments (6)
05
Helping Customers Move Workloads into the Cloud
Jason Mcgee
posted on July 05, 2018 10:38
Introduction Today, many IT organizations utilize VMware® vSphere™ to virtualize their enterprise infrastructure or create private clouds ...
[Read the rest of this article...]
Actions:
E-mail
|
Permalink
|
Comments (1)
05
How VMware Virtualization Right-sizes IT Infrastructure to Reduce Power Consumption
Jason Mcgee
posted on July 05, 2018 10:35
A Revolution in the Datacenter Virtualization provides tremendous energy benefits and a lifeline to datacenters that are running low on capacity an...
[Read the rest of this article...]
Actions:
E-mail
|
Permalink
|
Comments (3147)
05
Vigilant Cloud Front Solution
Jason Mcgee
posted on July 05, 2018 10:31
1 Solution The Vigilant Cloud Front service obfuscates and organization core infrastructure by deploying a proxy service for any application thru pub...
[Read the rest of this article...]
Actions:
E-mail
|
Permalink
|
Comments (1)
05
Oracle Licensing on VMware
Jason Mcgee
posted on July 05, 2018 10:29
Oracle Licensing on VMware Don’t let Oracle’s antiquated licensing scheme and the fact that they have not certified their products to ...
[Read the rest of this article...]
Actions:
E-mail
|
Permalink
|
Comments (1)
05
Data Protection Methodologies in the Virtual Environment
Jason Mcgee
posted on July 05, 2018 10:26
Overview of this Document Virtualization removes the dependency of the workload on the hardware, resolving the hardware failure scenario, but exposes...
[Read the rest of this article...]
Actions:
E-mail
|
Permalink
|
Comments (1)
05
Vigilant Bladecenter Hosting
Jason Mcgee
posted on July 05, 2018 09:45
Overview of this Document: This document provides a high level technical brief outlining hosting of client environments in a Bladecenter ecosystems a...
[Read the rest of this article...]
Actions:
E-mail
|
Permalink
|
Comments (1)
29
Exactis Data Leak
Sydney Gonzalez
posted on June 29, 2018 10:55
Exactis, a major data company based in Palm Coast, Florida, has reportedly exposed highly personal information, such as people's phone numbers, home a...
[Read the rest of this article...]
Actions:
E-mail
|
Permalink
|
Comments (315)
Page 5 of 19
First
Previous
1
2
3
4
[5]
6
7
8
9
10
Next
Last
Services
Cloud Solutions
Vigilant Cyber Services
Disaster Recovery
Business Continuity
Cloud Engineering
Virtualization
Whitepapers
Resources
Portfolio
Blogs
News
Tools
Copyright 2004 - 2021 by Vigilant Technologies / Chandler Automated Systems / CASIT
:
Terms Of Use
:
Privacy Statement
Login