Blogs

How to protect businesses and individuals from increasingly sophisticated phishing scams
How to protect businesses and individuals from increasingly sophisticated phishing scams

23 August 2018

Businesses, government organisations and individuals are being subjected to increasingly sophisticated phishing scams. These scams...

Read More
AI And Health: What Does The Future Hold?
AI And Health: What Does The Future Hold?

23 August 2018

Artificial Intelligence (AI) is no longer just the fantasy of sci-fi movies, the future has...

Read More
Cisco And Arista Settle Their Lawsuit
Cisco And Arista Settle Their Lawsuit

15 August 2018

Cisco and Arista have agreed on a ceasefire regarding their ongoing legal battle. A joint statement...

Read More
How To Use Baselining To Your Advantage In Open-AudIT
How To Use Baselining To Your Advantage In Open-AudIT

14 August 2018

For auditing and management purposes it can be advantageous to baseline individual devices against a...

Read More
Adopting ITIL/ITSM And Leveraging Opmantek Solutions To Increase Performance Management.
Adopting ITIL/ITSM And Leveraging Opmantek Solutions To Increase Performance Management.

14 August 2018

Managing a network can be expensive, time-consuming, and at times confusing. Mixing different software and...

Read More
How to Audit in Complex Network Environments
How to Audit in Complex Network Environments

14 August 2018

Every environment is different and we understand that. We are often questioned if Open-AudIT is...

Read More
Automating Operations: 7 Benefits Of Automation For Business
Automating Operations: 7 Benefits Of Automation For Business

10 August 2018

Hearing the word ‘automation’ may trigger images of a robot replacing human workers and rendering personal contributions...

Read More
Boletin Mensual Agosto
Boletin Mensual Agosto

1 August 2018

En este número: Vegas Night. Exceso de juntas ¿Podría jugar en contra de la productividad “meetingitis” ¡Tenemos...

Read More
Automated Configuration Change Detection
Automated Configuration Change Detection

23 July 2018

How important is File Integrity Monitoring? This is a difficult question because depending on the...

Read More
File And Folder Audit And Automation
File And Folder Audit And Automation

2 July 2018

In previous posts (here first and secondly here) I have talked about how easy it is to...

Read More
Meeting Regulatory Audit Requirements with Opmantek
Meeting Regulatory Audit Requirements with Opmantek

2 July 2018

Getting Compliant: How to Meet Regulatory Audit Requirements Using Opmantek’s Products It’s a spaghetti string of...

Read More
Boletin Mensual Julio
Boletin Mensual Julio

1 July 2018

En este número: Unn mensaje de Craig Brasil el Silicon Valley de Latinoamerica Conoce A buestro...

Read More

Need Help?

Find out how FirstWave can scale ​your network
management and cybersecurity of your business?

Contact Us
Need help?