Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on IT Networks and related technologies.

Security Integrations in Observability Self-Hosted

Integrating security data with observability data provides a comprehensive view for better threat detection and response. Security observability helps connect the dots between seemingly innocent events that, when correlated, reveal complex attack patterns. SolarWinds security products integrate into observability self-hosted, including Security Event Manager for log data and event correlation, Access Rights Management for identifying potential attack vectors, configuration management for compliance monitoring, and Patch Manager for tracking critical updates.

Migrating Your DX NetOps Integrations from OData 2 to OData 4

If you integrate DX NetOps with external dashboards, reporting engines, or IT service management tools, you likely rely on our API framework. We are currently migrating this framework from OData 2 to OData 4. This transition requires you to update your existing integrations so they continue to function properly. Let me walk you through exactly what is changing, how to identify your active API queries, and the specific adjustments you need to make to your setup.

How Home-Based Networks Shape Internet Trust Signals

Every website visit triggers a silent background check. Servers don't just see a visitor; they see an IP address, and that address carries a reputation built over years of behavior. Some IPs walk in trusted by default. Others get pulled aside for extra screening before the page even finishes loading. The reason comes down to where the connection originates. Traffic from a home broadband line in Manchester reads differently than traffic from a server farm in Virginia, even when the request itself looks identical. That gap drives billions in fraud prevention spend.

8 Best VPN Services for 2026

It’s 2026 and it’s time to get up to speed. A Virtual Private Network (VPN) is an absolute necessity for anyone working remotely or anyone who travels often. That said, there are plenty of other people who would benefit from a solid VPN. VPNs work by providing an end-to-end encrypted tunnel between your device and the VPN operator’s server. All of your traffic is then encrypted and routed through this tunnel.

From fragile to resilient: Rethinking security operations in the age of AI

Watch From Fragile to Resilient: Rethinking Security Operations in the Age of AI to hear Nicole Reineke from N-able and Fernando Montenegro from The Futurum Group discuss how AI is reshaping the threat landscape, where current security operations models are starting to break down, and what a more resilient approach looks like in practice. This session explores the rise in AI-driven attacks, the growing pressure on security teams from alert overload and visibility gaps, and practical ways organizations can improve response, recovery, and resilience across the full threat lifecycle.

Auvik Aurora and the Future of AI in IT Operations

We built something called Auvik Aurora, and before you scroll any further, I can already hear your thoughts. “Wait a second, Anto. Is this going to be another blog post giving me the hard sell on using AI?” Fair enough, I don’t think anyone would blame you, especially when we’re seeing AI adoption across nearly every industry, tool, hobby, workflow, or even . The blank is intentional, AI is everywhere, and chances are that you already know that it matters.