Jim Hansen is the vice president of products, application management, at SolarWinds, bringing over 20 years of experience building and delivering simple and easy-to-use software solutions. Jim is passionate about customers, understanding their needs, and delivering solutions that make their jobs easier and their infrastructures easier to manage and secure. He joined SolarWinds in August 2018 to help build the security portfolio, and has since been focused on growing the application management business—designed to help IT professionals and developers manage and monitor the health and performance of their application infrastructures.


author:

Security

Solving the Contractor Breach Challenge

May 5, 2020

Federal IT pros are having more success tackling cybersecurity challenges within their agencies. However, there’s still much work to be done when it comes to solving the security challenges posed by contractors. According to our Federal Cybersecurity Survey Report from last year, more than …


author:

Applications

APM: The Secret to Digital Transformation

February 10, 2020

By now, we’ve talked about the findings of SolarWinds Cloud Confessions 2020 and recommendations for how tech pros can use APM for more than just the troubleshooting of their most critical applications. But we need to explore one more important area. This time, we …


author:

Applications

A Trusted Roadmap for Full APM Success

February 7, 2020

Our latest survey, SolarWinds Cloud Confessions 2020, showed APM tools have hit mainstream in terms of usage, but more work is needed to realize their potential as key business drivers. This means overcoming challenges from a lack of solution awareness, to learning how to …


author:

Applications

Confession: We’re Not Using APM to its Potential

February 5, 2020

After years of application developers only using application performance management (APM) technology during development, today’s modern application stack has expanded to include containerized and multi-cloud environments. This evolution has catapulted the technology into production use and, thus, the IT operations mainstream. As environments became …



author:

Security

New Laws Alone Won’t Be Enough to Secure IoT Devices

January 28, 2020

Security concerns over the Internet of Things (IoT) are growing, and federal and state lawmakers are taking action. First, the U.S. Senate introduced the Internet of Things Cybersecurity Improvement Act of 2017, which sought to “establish minimum security requirements for federal procurements of connected …



author:

Security

4 Keys to Successful Cyberdefense Automation

December 31, 2019

Automation can reduce the need to perform mundane tasks, improve efficiency, and create a more agile response to threats. For example, administrators can use artificial intelligence and machine learning to ascertain the severity of potential threats and remediate them through the appropriate automated responses. …


author:

Security

3 Ideas to Build a Better Cybersecurity Strategy

December 24, 2019

Data from the Center for Strategic and International Studies paints a sobering picture of the modern cybersecurity landscape. The CSIS, which has been compiling data on cyberattacks against government agencies since 2006, found the United States has been far and away the top victim …