Configure Agentless User Identification – Palo Alto

Configure Agentless User Identification – Palo Alto

Enabling user identification on a Palo Alto firewall can add useful functionality to your configuration. It will give additional visibility into user activity on your network providing granularity in your reports, creating an accurate picture of network activity. With...
How to: Map a Network Drive

How to: Map a Network Drive

Two common questions: “What is a network drive?” and “How do I map it?” What is a network drive? • A network drive is a shared folder on the a server that has been “mounted” or “mapped”: How do I map a network drive? Step 1: Start > Computer Step 2: “Map network...

Securing the Future of Your Download-Only Software

Let’s face it, software developers are moving more towards digital distribution rather than physical boxed products. There’s less bulk, it’s cheaper to distribute, and it arrives in the customer’s hands almost as fast as it takes to stream a movie off Netflix. There’s...

Why Working With an MSP is as Easy as Making a PBJ

As a child, a peanut butter and jelly sandwich stood for independence. The ability to make your own food when you were hungry was a great milestone. From grape jelly and strawberry jam to creamy and chunky peanut butter, every person on this planet has their own...

Safeguarding Your Business Future

Investing in the security of a business translates to investing in the future of the business: without a secure defense against attackers, the company could crumble. Businesses running without a robust security structure risk not only losing data and important assets...