About Us > Jim Hansen
Avatar photo
Connect:

Jim Hansen

Former Vice President, Application Management, SolarWinds

Jim Hansen is the vice president of strategy for applications, infrastructure, and security at SolarWinds, bringing over 20 years of experience to building and delivering simple and effective software solutions. Jim is passionate about meeting customer needs to make their jobs easier and their infrastructures both secure and seamless. He joined SolarWinds in August 2018 to build the security portfolio and has since expanded to cover infrastructure and application monitoring—operating under the belief that cost and complexity shouldn’t be prohibiting factors in achieving application and infrastructure performance and security, especially when the performance and security is mission critical to business success. Prior to SolarWinds, Hansen held leadership roles at AlienVault, Splunk, BigFix, and other security-focused software companies. He holds a B.S. in information and computer science from the University of California at Irvine.

Posts Featuring Jim Hansen

Giving SIEM Tools a Role in Your IT Security Operations

While there is no one single solution to guard agencies against all cyberthreats, there are tools that can certainly go a long way toward managing and understanding the cyberthreat landscape.…

Neglect These Cybersecurity Fundamentals at Your Peril

“Shiny object syndrome” exists within both the IT and cybersecurity fields. The press loves to focus on the sleekest new security toys or the latest threat-hunting technique. After all, red-team/blue-team…

Security Quickfire /Security Threats and Cyber Hygiene — SolarWinds TechPod 005

In this episode of SolarWinds TechPod, Tech Talks, host Alex Navarro discusses security threats, the importance of practicing good cyber hygiene, and best practices for managing users and their devices…

7 Steps to Build an Effective Cyberincident Response Process

As an IT security professional, you work hard to prevent cyberattacks. You patch your systems regularly, update antivirus libraries, run user trainings, and lock down user access to sensitive systems…

A Frank Discussion of Multifactor Authentication

Someone steals credentials from one of your client’s executives. They guess the username and password to their email account. From there, the cybercriminal can send out targeted phishing emails to…

Three SIEM Must-Haves

Many businesses need to increase their security game. You can put all the preventive measures in place that you want—like patching, antivirus, mail protection, and firewalls—yet threats can still slip…