Operations | Monitoring | ITSM | DevOps | Cloud

Networks

The latest News and Information on IT Networks and related technologies.

New DX UIM Release: Start Monitoring New Linux Distributions on Day 1

From DX UIM 20.4 CU4 onward (that is, releases that have robot version 9.36 or above), robots automatically support Linux versions with newer GNU C Library (commonly known as “glibc”) versions. Prior to CU4, DX UIM robots needed certification and a release to provide support or compatibility with newer Linux operating systems that have a higher glibc version.

Enhancing Network Reliability: How to Measure, Test & Improve It

Whether you're a seasoned business owner or an IT professional, you're acutely aware that a reliable network is the bedrock upon which your organization's success is built. And this is where Network Reliability comes in. Picture this: a critical video conference with an important client, a crucial data transfer before a project deadline, or an online customer transaction on your e-commerce platform. What do they all have in common?

Augmenting behavior-based network detection with signature-based methods

Network detection tools utilize one of two prominent approaches for threat detection: AI-driven behavior-based methods capable of identifying early indicators of compromise, and signature-based ones, which flag known attacks and common CVEs. While these systems operate on distinct principles, their combination forms more robust defense mechanism, helps to consolidate tools, provides richer threat context and improves compliance.

What Is an IP Address Management Service and Why Might You Need It?

If you're managing a network, chances are that the need for IP Address Management (IPAM) is something you've already become familiar with. The ability to effortlessly and effectively manage your IP allocations will make your life much easier no matter what size of organization you work for. It can help streamline efforts by reducing complexity, minimizing manual intervention when configuring new devices or services within an enterprise intranet, and proactively resolving problems related to limited resources like addresses.

Adding a CDN to a load balancer (for a much faster website)

Here at Raygun, we like to go fast. Really fast. That’s what we do! When we see something that isn’t zooming, we try to figure out how to make it go faster. So today, we’re answering a simple (and relevant) question; how do we make our public site, raygun.com, much, much faster? The answer, at first glance, is simple—we build it into a Content Delivery Network (CDN).

How to Configure a Linux Firewall: The Ultimate Guide

A firewall stands as a digital gatekeeper, meticulously sifting through network traffic and deciding what may pass. This protective shield, fundamental to cybersecurity, is integral in the Linux world. The Linux kernel itself is effectively a de facto packet switching firewall, crafted as it is around the principles of packet filtering at the most fundamental operating system level, thus exemplifying the pivotal role of firewalls in system security.

ICMP Required for Traceroute and Network Diagnostics

As previously detailed on the Exoprise blog, the ICMP (Internet Control Message Protocol) is crucial for troubleshooting, monitoring, and optimizing network performance in today’s Internet-connected world. Despite historical security concerns, disabling ICMP is unnecessary and hampers network troubleshooting efforts. Modern firewalls can effectively manage the security risks associated with ICMP.