Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Top 4 Methods Used to Attack Networks (And How to Defend)

Threat actors use a number of different techniques to gain access to company networks so that they can deliver ransomware payloads. In this blog, we look at four of the most common techniques currently being used to attack networks. The intent is to help MSPs and IT admins understand where the threats are coming from, and then where to focus their attention in order to protect their (or their customers’) networks.

Top 3 public cloud costs to watch

“We moved to the cloud and now everything is more expensive!” Unfortunately, this is a common utterance from companies that have made the leap to a public cloud-based architecture, and a slowdown in adoption growth seen during the pandemic is hitting providers big and small as organisations rationalise cloud spend in the face of rising costs. The good news is these costs can typically be reined in without too much disruption or the need to retreat from the cloud.

Maximizing VoIP performance: Why VoIP monitoring is vital for IT organizations

Voice over IP (VoIP) is a fairly old technology, brought into prominence during the 90s as an alternative to the hegemony of public switched telephone network (PSTN) telephony providers in the market. While VoIP was an alternative to normal telephone at that time, it soon led to a cascade of technological developments that changed the IT landscape. In a modern IT organization, VoIP-based technologies are indispensable.

A Guide to Juniper Contrail SD-WAN

Integrating SD-WAN into your organization allows you to leverage transport services for seamless connection to applications. Various technologies facilitate this process by routing traffic between different sites. However, Juniper Network’s Contrail SD-WAN offers enhanced routing, intelligent traffic steering, zero-touch provisioning, and other features that build on the capabilities of traditional SD-WAN architecture.
Sponsored Post

OpManager: All-in-one network diagram software

Network diagram software holds an important place in modern ITOps. Policies like work from home and bring your own device as well as technologies like server virtualization and hybrid network architectures have resulted in dynamic network topologies. Network diagram software assists IT admins with tracking their network topology, visualizing their infrastructure, monitoring performance, and ensuring compliance.

Top 5 Trends Forecasted for Telco Operations' and Network Automation's Growing Impact

There’s no end in sight for the more-than-fair share of technological advancements the telecommunications sector has seen. And with change, comes challenges. The infrastructures that establish digital communication and connectivity that nearly everyone depends on are in regular, ongoing need of upgrades, which calls for significant investments in building and maintaining them. Much of the relevant decision-making comes from Communication Service Providers (CSPs).

What is a Firewall? Understanding Your Organization's First Line of Defense

Your organization depends on reliable network and endpoint security to ensure that all data is handled, stored, and protected properly. Generally, a comprehensive network security plan includes anti-virus software, access management, zero-trust policies, and endpoint security tools, among other things. A Firewall is considered to be one of the most important components of a network security plan.

How to Create Powerful, Customized Lua Mailers in HAProxy

SysOps teams know how crucial observability is to maintaining around-the-clock infrastructure health. And while HAProxy already provides reliable logging and stats (for diagnostics and monitoring), what if you could supplement those with a real-time alerting system? That idea inspired our initial inclusion of mailers in HAProxy. Since then, users have been asking for deeper mailer customizability—and we’re thrilled to deliver that with Lua-based email alerts in HAProxy 2.8.