Jim Hansen is the vice president of products, application management, at SolarWinds, bringing over 20 years of experience building and delivering simple and easy-to-use software solutions. Jim is passionate about customers, understanding their needs, and delivering solutions that make their jobs easier and their infrastructures easier to manage and secure. He joined SolarWinds in August 2018 to help build the security portfolio, and has since been focused on growing the application management business—designed to help IT professionals and developers manage and monitor the health and performance of their application infrastructures.

author:

Applications

APM: The Secret to Digital Transformation

February 10, 2020

By now, we’ve talked about the findings of SolarWinds Cloud Confessions 2020 and recommendations for how tech pros can use APM for more than just the troubleshooting of their most critical applications. But we need to explore one more important area. This time, we …


author:

Applications

A Trusted Roadmap for Full APM Success

February 7, 2020

Our latest survey, SolarWinds Cloud Confessions 2020, showed APM tools have hit mainstream in terms of usage, but more work is needed to realize their potential as key business drivers. This means overcoming challenges from a lack of solution awareness, to learning how to …


author:

Applications

Confession: We’re Not Using APM to its Potential

February 5, 2020

After years of application developers only using application performance management (APM) technology during development, today’s modern application stack has expanded to include containerized and multi-cloud environments. This evolution has catapulted the technology into production use and, thus, the IT operations mainstream. As environments became …



author:

Security

New Laws Alone Won’t Be Enough to Secure IoT Devices

January 28, 2020

Security concerns over the Internet of Things (IoT) are growing, and federal and state lawmakers are taking action. First, the U.S. Senate introduced the Internet of Things Cybersecurity Improvement Act of 2017, which sought to “establish minimum security requirements for federal procurements of connected …



author:

Security

4 Keys to Successful Cyberdefense Automation

December 31, 2019

Automation can reduce the need to perform mundane tasks, improve efficiency, and create a more agile response to threats. For example, administrators can use artificial intelligence and machine learning to ascertain the severity of potential threats and remediate them through the appropriate automated responses. …


author:

Security

3 Ideas to Build a Better Cybersecurity Strategy

December 24, 2019

Data from the Center for Strategic and International Studies paints a sobering picture of the modern cybersecurity landscape. The CSIS, which has been compiling data on cyberattacks against government agencies since 2006, found the United States has been far and away the top victim …


author:

Security

Using User Access Management to Defend Against Insider Threats

December 17, 2019

According to the SolarWinds 2019 Cybersecurity Survey, cybersecurity threats are increasing—particularly the threat of accidental data exposure from people inside the agency. According to the survey, 56% of respondents said the greatest source of security threats to federal agencies is careless and/or untrained agency …


author:

Security

Worried About Protecting Your Data? CDM Is Here to Help

December 3, 2019

The Continuous Diagnostics and Mitigation (CDM) Program, issued by the Department of Homeland Security (DHS), goes a long way toward helping agencies identify and prioritize risks and secure vulnerable endpoints. How can a federal IT pro more effectively improve an agency’s endpoint and data …