Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on IT Networks and related technologies.

Managing Nuisance Calls, Toll-Free Fraud & Brand Pirating

Not only are businesses losing millions of dollars to hackers running up toll-free charges and stealing telecom services, these same bad actors also harass employees with nuisance calls or phishing attempts. Worst of all, some are stealing your brand to make fraudulent calls to customers and are threatening your organization’s reputation.

What's New at Catchpoint! Fall 2024 Product Launch Event

Watch our semi-annual launch event hosted by Matt Izzo, CPO, and Howard Beader, VP Product Marketing - with a live demo from Bob Ruggiero, Director of Solutions Engineering. We share details of our Internet Performance Monitoring (IPM) platform strategy, enabling you to monitor what matters from where it matters to get to the answers faster, and highlight our new capabilities around.

MSP's Guide to Getting Started With Compliance as a Service

In this episode of Beyond the Horizon, Stefanie Hammond steps in to interview Lewis Pope about the critical role of compliance in the managed services provider (MSP) landscape. They discuss how MSPs can pivot to offer Compliance as a Service (CaaS), the importance of internal assessments, and the challenges faced when implementing compliance strategies. Lewis emphasizes the need for MSPs to adapt to changing client demands, manage internal cultural shifts, and consider partnerships to enhance their compliance capabilities.

How to Dig Deeper on the Network When You Don't Have NetFlow

Bro, I ain’t got flow isn’t only heard at your local hip hop mic night. It’s a gripe from many network administrators who have inherited small environments, networks with lower-end gear, or who are in the trenches dealing with a time-sensitive issue and need to dig deep—now. NetFlow is a Layer 3 protocol that, over time, allows administrators to see how much traffic is being generated, by whom, and where that traffic is going.

Introducing SNMP Poller History

Despite everyone’s best efforts, network failures happen. And when downtime means lost productivity, fast troubleshooting becomes an integral part of IT operations. So with the addition of SNMP poller history, Auvik providing users an archive for troubleshooting, analysis, and planning. When it comes to managing network issues, diagnosing the root cause is the first step. And often, there’s a gap between when an incident occurs, and when it’s reported. And herein lies a big problem.

Network Time Synchronization: Why and How It Works

When something goes wrong, you need to look through your log messages and figure out important things like which device saw the problem first. This automatically tells you where to start looking for the root cause. If your clocks aren’t synchronized, it becomes much more difficult to correlate log messages between devices. More generally, you want to know if the similar log messages you’re seeing are related to the same incident or if maybe some of them happened much earlier or later.

Unifying Security and Data Recovery for More Seamless and Robust Cyber Defenses

Cybercriminals are constantly looking for ways to bypass defenses. You need to plan for when attackers will breach your defenses. When attackers exploit a vulnerability, you need a solution that quickly detects activities, mitigates attacks, expels attackers and enables recovery from any damage caused. It’s becoming increasingly clear that having a unified approach to data security is essential.

What Are Network Alerts? Alert Management Guide

It’s the middle of the workday and suddenly your IT team starts receiving calls: systems are slow, applications are unresponsive, and productivity grinds to a halt. Before you know it, you’re scrambling to pinpoint the issue and juggling complaints, all while the clock is ticking and downtime costs are piling up. The problem?