Operations | Monitoring | ITSM | DevOps | Cloud

Networks

The latest News and Information on IT Networks and related technologies.

Spiceworks Adds Free Network Inventory Application to its Suite of Integrated Cloud-based Solutions

AUSTIN, Texas — October 9, 2018 — Today at SpiceWorld 2018, Spiceworks announced a new cloud-based Spiceworks Inventory application that integrates with the cloud editions of Spiceworks Help Desk and Spiceworks Remote Support to help IT professionals more intuitively manage their technology assets and support end users from a single, easy-to-use ecosystem.

How to add Solarwinds nodes to your Enterprise Applications

Today we welcome David Morris, a System Centre Engineer for one of the world's largest law firms, who has written a special guest blog about the Solarwinds community MP. A must read for anyone who has Solarwinds and Microsoft System Center Operations Manager (SCOM). We'd like to thank David for taking the time to write up this fantastic piece of content - it's another great example of the SCOM community hard at work.

Zero-Trust Networks: When They Make Sense and When They Don't

As business applications shift from living on-premises to the cloud, it may not always be necessary to enable communication between user devices. In fact, preventing your clients’ user devices from contacting each other—part of a zero-trust network approach—could prevent a malicious cyber attack from spreading and costing clients major data recovery fees.

Visibility for Security You Can't Protect What You Can't See

As an MSP, your first line of defense for clients is visibility. You need to know exactly which devices you’re protecting and how those devices are configured. You also need to know what your client’s users are doing out there in the cyber wilds. Without these insights, you’re flying blind in a crazy fast-paced world of threats and risks. In this one-hour webinar from ID Agent and Auvik Networks, we’ll demonstrate how what you don’t.

Own the Network Network Management for MSPs EMEA

Most MSPs will agree that the majority of networking offerings out there are not built for the channel. This leads to poor support, cobbled together solutions, and poor management capabilities. In today’s cloud-dominated world, the network is more important to your clients than ever—it’s the gateway to everything they need.

Simplifying security auditing, part 5: Detecting network attacks

Anyone trying to access resources in your network needs to interact with your network devices: firewalls, routers, switches, and IDS/IPSs. Each of these devices generate syslogs that contain important security information and must be audited to gain complete visibility into the activities occurring in your network. Most SIEM solutions, including our own Log360, can collect and analyze syslogs in real time and instantly alert security teams if any security event of interest occurs.