/ Jim Hansen

Jim Hansen

Avatar photo
Former Vice President, Application Management, SolarWinds

Jim Hansen

Jim Hansen is the vice president of strategy for applications, infrastructure, and security at SolarWinds, bringing over 20 years of experience to building and delivering simple and effective software solutions. Jim is passionate about meeting customer needs to make their jobs easier and their infrastructures both secure and seamless. He joined SolarWinds in August 2018 to build the security portfolio and has since expanded to cover infrastructure and application monitoring—operating under the belief that cost and complexity shouldn’t be prohibiting factors in achieving application and infrastructure performance and security, especially when the performance and security is mission critical to business success. Prior to SolarWinds, Hansen held leadership roles at AlienVault, Splunk, BigFix, and other security-focused software companies. He holds a B.S. in information and computer science from the University of California at Irvine.

The Latest Posts Featuring Jim Hansen

Inside the Black Box: Bridging the Database Observability Gap
March 27, 2026
Database

Over the past 15 years, Agile and DevOps have accelerated application delivery, enabling faster, more reliable releases. Yet the database layer often remains a blind spot for observability and performance monitoring.

In this article, Kevin Kline shows why closing the database observability gap is critical to improving performance, efficiency, and resilience for DBAs, developers, and the businesses that depend on their data.

7 Steps to Build an Effective Cyberincident Response Process

As an IT security professional, you work hard to prevent cyberattacks. You patch your systems regularly, update antivirus libraries, run user trainings, and lock down user access to sensitive systems and data. You follow solid cyber hygiene.

COVID-19 Pushes Schools to Their Limit, and the Cloud Shows Its Worth
For educators, students, and parents, the impact of the COVID-19 pandemic on learning has been profound. Thousands of schools across the U.S. closed their doors this spring and made the…
Five Steps to Developing an Application Modernization Strategy
Supporting legacy applications is problematic for several reasons. These aging systems are becoming increasingly obsolete and difficult to maintain. They use outdated software languages and unsupported hardware parts—some as much…
Three Ways Federal Agencies Can Manage and Secure Their Hybrid Data Centers
As hybrid environments become more popular, federal IT teams are faced with managing and securing their on-premises and cloud infrastructures, while minimizing costs—and there’s no single tool or approach that…
Solving the Contractor Breach Challenge

Federal IT pros are having more success tackling cybersecurity challenges within their agencies. However, there’s still much work to be done when it comes to solving the security challenges posed by contractors.

APM: The Secret to Digital Transformation
By now, we’ve talked about the findings of SolarWinds Cloud Confessions 2020 and recommendations for how tech pros can use APM for more than just the troubleshooting of their most…
A Trusted Roadmap for Full APM Success

Tech pros need to take APM skills development and learning seriously. Here’s how.

Confession: We’re Not Using APM to its Potential
After years of application developers only using application performance management (APM) technology during development, today’s modern application stack has expanded to include containerized and multi-cloud environments. This evolution has catapulted…
Careless and Malicious Insider Threats Are on the Rise Despite Better Detection
According to a 2019 Federal Cybersecurity Survey released last year by IT management software company SolarWinds, careless and malicious insiders topped the list of security threats for federal agencies. Yet,…
New Laws Alone Won’t Be Enough to Secure IoT Devices
Security concerns over the Internet of Things (IoT) are growing, and federal and state lawmakers are taking action. First, the U.S. Senate introduced the Internet of Things Cybersecurity Improvement Act…
123