Java Vulnerabilities and Exploits
The Cygna Auditor and PBMS code bases are not susceptible to java vulnerabilities and exploits.
March 31, 2022
The Non-Zero Components of a Zero Trust Network
In the face of a rising tide of network infiltration attempts via increasingly diversified attack vectors, enterprises must constantly remain vigilant and proactive in managing system monitoring and attack detection solutions.
March 28, 2022
Automate your DDI to Accelerate IT services delivery
Automation is among the key motivators for implementing an IP address management (IPAM) system.
February 17, 2022
Cygna Extends Multi and Hybrid Cloud Auditing with AWS
Cygna Auditor for AWS provides a cost effective and streamlined way to keep and view your AWS audit events.
February 17, 2022
Recovery for Azure AD
Cygna Recovery for Azure AD allows you to quickly and easily backup your Azure Active Directory data to help eliminate costly downtime.
January 25, 2022
The Cygna Auditor and PBMS code bases are not susceptible to the Log4j vulnerability that is actively being exploited.
December 14, 2021
We Put You in Control of Your Data – Database Segmentation
Cygna solutions are designed to put you in control of your data. This post discusses the new database segmentation functionality allowing Cygna Auditor data to be stored on more than one database server for unmatched scalability.
October 26, 2021
We put you in control of your data – Purging
Cygna solutions are designed to put you in control of your data. There are other new related features coming soon that will be covered in additional blog articles such as database segmentation and archiving.
August 20, 2021
Auditing Policies – Cygna Auditor for Active Directory
Cygna Auditor for Active Directory auditing policies have two main purposes, to protect objects from being changed or to exclude specified activities from being captured.
July 23, 2021