Operations | Monitoring | ITSM | DevOps | Cloud

Networks

The latest News and Information on IT Networks and related technologies.

Secret Keys to the Password Kingdom

Building trust with customers is a must for MSPs. And because of the unique nature of MSPs, it’s not always easy. Your customers aren’t simply giving you administrative access to a few admin accounts—they’re sharing secrets which must be securely managed across all the systems, apps, and users you manage for them. Passwords, SSH keys, licenses, cloud infrastructure logins, and SaaS portal accounts are just the beginning. To solve issues quickly, your technicians can’t waste time locating the credentials needed to resolve issues and make users happy.

Predictive Analytics to Improve Decision Making

Predictive analytics for networks are helping businesses optimize their network performance, anticipate network capacity related requirements, and eventually forecast future much more efficiently than ever. Gartner has estimated the value of network monitoring software market at roughly $2.1 Billion, this figure is presently increasing at a growth rate of 15.9% annually. The demand for predictive analytics in network monitoring software has grown beyond enterprises and datacentres.

Account Takeover IS Your Problem

Phishing and malware are scary enough, but the number-one tactic used by bad actors to get access to and take over accounts is something different: using compromised credentials. Why? Because it’s so easy. Data breaches happen almost constantly, and credentials get leaked. At the same time, people are prone to reuse the same few passwords across all their accounts. These two facts spell trouble, as it’s almost impossible for an IT professional to know if working credentials to their company email or CRM are floating around the dark web. Almost impossible that is, until now.

Make your monitors nearly real-time

Most of existing IPHost monitor types are passive, meaning they are being polled by IPHost – directly, or via remote network agent. There are two “active” monitors, that perform “Event” type alert, when receiving data from remote host: Syslog monitor and SNMP Generic Trap monitor. Although it’s not possible to transform all possible passive monitors to active, there are several approaches to make monitoring nearly real-time in certain situations.

Network baseline: new technologies, new challenges

The issue of network baseline arose quite some time ago. Everything started from the understanding that networks are not static entities, but are a set of elements that change over time. It was also understood that networks are not only made up of physical and tangible elements, such as a router or a switch, but we must also have more abstract elements, such as the traffic pattern over a WAN link, for example.

Auvik Turns 8: A Look Back on Our First 8 Years

2011 was a big year for pop culture: Prince William and Kate Middleton tied the knot, Ashton Kutcher replaced Charlie Sheen in Two and a Half Men, and the theatrical release of Harry Potter and the Deathly Hallows: Part 2 marked the end of an era. While our eyes were turned to the screen, something else was happening—two former co-workers were deciding it was time to start a new adventure together. Know what that means?

Motadata's Network Configuration Management Software

Motadata's Network Configuration Management helps users deploy policy compliant configurations, alerts them on out of process changes, monitors devices for configuration changes, backup and restore device configurations, manage configuration changes. It works in a multi-vendor environment and it can work with almost all the devices on your network.