Two reports to find out where you are using Log4j


PRODUCT Two reports to find out where you are using Log4j A flaw in Apache Log4j allows an attacker to execute arbitrary code by injecting attacker-controlled data into a logged message. Though vScope does not inventory specific files on servers, it can be of great help identifying applications and systems

Two reports to find out where you are using Log4j2022-01-26T12:56:06+00:00

Veeam, CommVault or Veritas?


Veeam, Veritas or CommVault? In today's fast-paced world, customers and employees want their data available at all times and companies can't afford any downtime for mission-critical assets. But as we know, systems can crash for a number of reasons. At the same time more sophisticated forms of ransomware are emerging putting organizations at

Veeam, CommVault or Veritas?2023-03-07T06:52:06+00:00

Patch Management Best Practices


Patch Management Best Practices If you’ve made it to this page I suspect you already know a little about patching and its importance. But in an ever-changing world with increasing digital threats, patching is more important than ever. This was recently showcased by the colossal Equifax breach that could've easily been

Patch Management Best Practices2023-02-04T09:11:26+00:00