Operations | Monitoring | ITSM | DevOps | Cloud

Networks

The latest News and Information on IT Networks and related technologies.

Monitor networks with microscopic precision: Understanding network path analysis

Just as an atom is the building block of all matter, a network packet is a basic unit of data transmitted over a network. But to visualize how atoms makeup a piece of metal, scientists need an electron microscope. Likewise, to visualize, observe, and, most importantly, understand the behavior of network packets in a network, a specialized tool is needed: a network path analysis tool. This tool can visually trace the path taken by network traffic from source to destination.

Streamlining Success: The Core Reasons to Embrace Configuration Management

WhatsUp Gold’s Configuration Management tool is a seamless add-on to the interface; Configuration Management lets you centralize and automate all your management tasks and securely back up device configurations. Watch this webinar and learn how to: Automate configuration management tasks, backups and recovery Bring consistency to your configurations across your device roles Meet security and compliance guidelines with alerting, archiving and automated reporting.

Microsoft 365 APM Profiles using REST API Monitor and Microsoft Graph API

As of WUG 2022 our REST API monitor supports OAuth 2 Client Credentials allowing a daemon application (non user interactive) to authenticate as an application to the Graph API. Using this new capability we created new APM profile to monitor Microsoft 365 and Office 365.

CISO Fireside Chat: Volkswagen Slovakia Implements Progress Flowmon

Volkswagen Slovakia's IT and operational technology departments operate and monitor thousands of IP addresses and User ID credentials, as well as hundreds of automated machines. The company trusts Progress® Flowmon® to execute new strategies tied to security monitoring, detecting anomalies and enforcing its Zero Trust Policy. Join us for a Fireside Chat with Marian Klaco, Volkswagen Slovakia's Chief Information Security Officer.

How OpManager helps network admins monitor east-west and north-south traffic seamlessly

According to a report on the network traffic analysis market, the market is expected to grow significantly, reaching $6,540.61 million by 2028. This growth is projected at a CAGR of 9.38% from 2022 to 2028. Understanding these trends is vital for IT and other organizations that depend on analyzing their network traffic for improved network management and performance.

Agent-Based Network Monitoring: Monitoring Distributed Networks

Network monitoring has long been a cornerstone of IT management, providing insights into network activity, performance metrics, and potential issues. However, traditional network monitoring methods often need to catch up to keep pace with the dynamic and complex nature of modern networks. As organizations strive to optimize network performance, minimize downtime, and enhance overall reliability, the role of proactive agent-based network monitoring software like Obkio becomes increasingly crucial.

Internet VPN Performance Troubleshooting For Multi-Site SMBs with Obkio's Basic Plan

At Obkio, we frequently get asked the question by potential customers: "Which plan do I need?". So we decided to share the perfect use case to provide clarity. What better way to illustrate the capabilities of our Basic Plan than by showcasing a real-life scenario of a multi-site SMB taking advantage of it?

After a Ransomware Infection - Enhancing Security for Your Infrastructure Against Further Intrusion

In a previous blog, we outlined the essential steps that organizations should take within the first two days after the detection of a ransomware attack. In this follow-up post, we’ll discuss what an organization should do after the initial response to reduce the risks of future attacks. We’ll also highlight how Progress Flowmon can support ongoing network monitoring, early detection of attacks and reduction of further damage. Webinar: The First 48 Hours of Ransomware Incident Response.

Software Load Balancers vs Appliances: Better Performance & Consistency With HAProxy

Software load balancers and load balancing appliances have become indispensable components within a healthy application infrastructure. Scalability, security, observability, and reliability are more critical than ever as companies push harder towards 99.999% availability. Accordingly, traffic management is key to protecting servers and ensuring uptime. Vendors have offered load balancers in different form factors to serve evolving infrastructure needs.

Practical Network Automation using Low Code Tools

Automation uses software to control network resources dynamically with minimal human intervention. It can speed up services delivery and keep the network running at peak efficiency, boosting revenues and reducing costs. With this potential, one might think that automation of telecom networks would be widespread, but that is not the case. Automation in telecom lags compared to industries like transportation, shipping, and cloud computing services.