/ Jim Hansen

Jim Hansen

Avatar photo
Former Vice President, Application Management, SolarWinds

Jim Hansen

Jim Hansen is the vice president of strategy for applications, infrastructure, and security at SolarWinds, bringing over 20 years of experience to building and delivering simple and effective software solutions. Jim is passionate about meeting customer needs to make their jobs easier and their infrastructures both secure and seamless. He joined SolarWinds in August 2018 to build the security portfolio and has since expanded to cover infrastructure and application monitoring—operating under the belief that cost and complexity shouldn’t be prohibiting factors in achieving application and infrastructure performance and security, especially when the performance and security is mission critical to business success. Prior to SolarWinds, Hansen held leadership roles at AlienVault, Splunk, BigFix, and other security-focused software companies. He holds a B.S. in information and computer science from the University of California at Irvine.

The Latest Posts Featuring Jim Hansen

Giving SIEM Tools a Role in Your IT Security Operations
July 16, 2019
Security
While there is no one single solution to guard agencies against all cyberthreats, there are tools that can certainly go a long way toward managing and understanding the cyberthreat landscape.…
Neglect These Cybersecurity Fundamentals at Your Peril
May 8, 2019
Security

Cybercriminals typically don’t discriminate. Targeted campaigns like spear phishing or focused advanced persistent threats aren’t as common as mass-style attacks. Hackers often try to cast a wide net, hoping they get a hit and can exfiltrate or encrypt a company’s data for ransomware. In short, SMBs are targets because criminals target everyone.

Security Quickfire /Security Threats and Cyber Hygiene — SolarWinds TechPod 005
March 7, 2019
Podcast TechPod
In this episode of SolarWinds TechPod, Tech Talks, host Alex Navarro discusses security threats, the importance of practicing good cyber hygiene, and best practices for managing users and their devices…
A Frank Discussion of Multifactor Authentication
February 20, 2019
Security
Someone steals credentials from one of your client’s executives. They guess the username and password to their email account. From there, the cybercriminal can send out targeted phishing emails to…
Three SIEM Must-Haves
December 19, 2018
Security
Many businesses need to increase their security game. You can put all the preventive measures in place that you want—like patching, antivirus, mail protection, and firewalls—yet threats can still slip…
123