About Us > Jim Hansen
Avatar photo
Connect:

Jim Hansen

Former Vice President, Application Management, SolarWinds

Jim Hansen is the vice president of strategy for applications, infrastructure, and security at SolarWinds, bringing over 20 years of experience to building and delivering simple and effective software solutions. Jim is passionate about meeting customer needs to make their jobs easier and their infrastructures both secure and seamless. He joined SolarWinds in August 2018 to build the security portfolio and has since expanded to cover infrastructure and application monitoring—operating under the belief that cost and complexity shouldn’t be prohibiting factors in achieving application and infrastructure performance and security, especially when the performance and security is mission critical to business success. Prior to SolarWinds, Hansen held leadership roles at AlienVault, Splunk, BigFix, and other security-focused software companies. He holds a B.S. in information and computer science from the University of California at Irvine.

Posts Featuring Jim Hansen

4 Keys to Successful Cyberdefense Automation

Automation can reduce the need to perform mundane tasks, improve efficiency, and create a more agile response to threats. For example, administrators can use artificial intelligence and machine learning to…

3 Ideas to Build a Better Cybersecurity Strategy

Data from the Center for Strategic and International Studies paints a sobering picture of the modern cybersecurity landscape. The CSIS, which has been compiling data on cyberattacks against government agencies…

Using User Access Management to Defend Against Insider Threats

According to the SolarWinds 2019 Cybersecurity Survey, cybersecurity threats are increasing—particularly the threat of accidental data exposure from people inside the agency. According to the survey, 56% of respondents said…

Worried About Protecting Your Data? CDM Is Here to Help

The Continuous Diagnostics and Mitigation (CDM) Program, issued by the Department of Homeland Security (DHS), goes a long way toward helping agencies identify and prioritize risks and secure vulnerable endpoints.…

The Do’s and Don’ts of Edge Computing

Edge computing is here to stay and it’s no wonder. Edge computing provides federal IT pros with a range of advantages they simply don’t have with more traditional computing environments.…

How Security Leaders Might Minimize Human Error

A recent federal cybersecurity survey by SolarWinds found federal IT professionals feel threats posed by careless or malicious insiders or foreign governments are at an all-time high. Worse, hackers aren’t…

Assessing the Navy’s New Cybersecurity Program

The Navy’s new Combat to Connect in 24 Hours (C2C24) is an ambitious program with the potential to change naval warfare as we know it. The program is designed to…

2 Key Assets in the Government’s Cybersecurity Battle (Part II)

Read part one here. Technology: Providing the Necessary Visibility Cybersecurity personnel can’t succeed without the proper tools, but many of them don’t have the technology necessary to protect their agencies.…

2 Key Assets in the Government’s Cybersecurity Battle (Part I)

The Trump administration issued two significant reports in the last couple of months attesting to the state of the federal government’s cybersecurity posture. The Federal Cybersecurity Risk Determination Report and…

Making Every Agency Employee a Security Advocate

The rising numbers of data breaches should come as no surprise to federal IT security pros who work every day to ensure agency information is secure. However, these breaches may…