/ Jim Hansen

Jim Hansen

Avatar photo
Former Vice President, Application Management, SolarWinds

Jim Hansen

Jim Hansen is the vice president of strategy for applications, infrastructure, and security at SolarWinds, bringing over 20 years of experience to building and delivering simple and effective software solutions. Jim is passionate about meeting customer needs to make their jobs easier and their infrastructures both secure and seamless. He joined SolarWinds in August 2018 to build the security portfolio and has since expanded to cover infrastructure and application monitoring—operating under the belief that cost and complexity shouldn’t be prohibiting factors in achieving application and infrastructure performance and security, especially when the performance and security is mission critical to business success. Prior to SolarWinds, Hansen held leadership roles at AlienVault, Splunk, BigFix, and other security-focused software companies. He holds a B.S. in information and computer science from the University of California at Irvine.

The Latest Posts Featuring Jim Hansen

Neglect These Cybersecurity Fundamentals at Your Peril
May 8, 2019
Security
However, for many organizations, advanced tactics can be overkill. They’re also more art than science, and relatively few people are qualified to implement them. More importantly, most common types of…
Security Quickfire /Security Threats and Cyber Hygiene — SolarWinds TechPod 005
March 7, 2019
Podcast TechPod
In this episode of SolarWinds TechPod, Tech Talks, host Alex Navarro discusses security threats, the importance of practicing good cyber hygiene, and best practices for managing users and their devices…
7 Steps to Build an Effective Cyberincident Response Process
March 6, 2019
Security
As an IT security professional, you work hard to prevent cyberattacks. You patch your systems regularly, update antivirus libraries, run user trainings, and lock down user access to sensitive systems…
A Frank Discussion of Multifactor Authentication
February 20, 2019
Security
Someone steals credentials from one of your client’s executives. They guess the username and password to their email account. From there, the cybercriminal can send out targeted phishing emails to…
Three SIEM Must-Haves
December 19, 2018
Security
Many businesses need to increase their security game. You can put all the preventive measures in place that you want—like patching, antivirus, mail protection, and firewalls—yet threats can still slip…
123