The latest News and Information on IT Networks and related technologies.
The old security model, which followed the “trust but verify” method, is broken. That model granted excessive implicit trust that attackers abused, putting the organization at risk from malicious internal actors and allowing unauthorized outsiders wide-reaching access once inside. The new model, Zero Trust networking, presents an approach where the default posture is to deny access.
A new article in the September issue of LANLine (“Automation creates productivity”) summarizes typical challenges and problems in network monitoring very well and is really worth reading. I would like to briefly discuss some of the issues raised and how our product Enterprise Alert® was developed to solve them. Of course, it is important that especially critical alarms are processed promptly. Even small problems can quickly lead to major failures.
For the past 15 years, there's been a shift in how people work, where they work from and how they connect to "work". Employees are no longer tethered to headquarters, their offices or tied to slower complicated VPN services. Additionally, the way people work and where they work from has changed. Along with flexible work hours, employees want workplace flexibility. And with such a competitive job market, employers have to deliver! Flexible work environments offer tremendous benefits such as improved productivity and morale, reduced stress levels and better work-life balance which builds trust and commitment.
“The IP of that device? Let me look it up in this spreadsheet with a never-ending list of IP addresses! *sigh*” Sound familiar? Do you often need to block a certain port allowing unauthorized traffic, get the MAC address of the IP taking up most of your bandwidth, or scan for rogue devices entering your network? Then the IPAM SPM add-on is the solution for you!
HAProxy Enterprise handles SAML single sign-on for your applications and integrates with identity providers like Azure Active Directory.
With networks continually scaling to meet business needs, advanced IP scanning has become a crucial task for network admins to ensure network availability and performance. Scanning IP addresses can be challenging in large networks, which often include wired and wireless devices with dynamic IPs, multiple DNS, DHCP configurations, and complex subnets.