Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

What Is a Firewall?

A firewall is a cybersecurity tool used to prevent unauthorized access to your private device or network. It could refer to any software or hardware that checks the data and traffic coming in and going out of a network to ensure they comply with cybersecurity rules. Firewalls can also include what is known as an intrusion detection system (IDS), which additionally blocks malicious traffic while allowing legitimate and authorized traffic access to a network.

Boost Application Experience with Network Behavior Analysis

“Network behavior analysis (NBA) is a network monitoring program that ensures the security of a proprietary network. NBA helps in enhancing network safety by watching traffic and observing unusual activity and departures of a network operation,” explained Techopedia. “Network behavior analysis monitors the inside happenings of an active network by collecting data from many data points and devices to give a detailed offline analysis.

How to Monitor Google Cloud Interconnect and Network Performance

Google Cloud Interconnect promises data transfers with low latency, and high availability - but how can you make sure that it’s actually performing as promised? Continuously monitoring Google Cloud Interconnect performance is the key to identifying slowdowns, high levels of packet loss, and other problems affecting Google Cloud. Keep reading to learn how to do it all in minutes using Obkio Network Monitoring!

Data Center's Need MSPs

A recent Honeywell survey reinforced something many in the MSP world already knew: data centers need managed service providers. 96% of facility managers indicated remote management is important, but only 34% had remote management capabilities in place. That’s surprising in a digital world where data centers enable critical business functions and an epic business opportunity for MSPs looking to enter the data center world.

Device discovery: The path to total network visibility

For an organization to prevent cyberattacks, it first needs complete visibility into all the events that occur within its network. With this visibility, the organization can analyze risky behavior by users and entities, and take the necessary steps to proactively secure itself. However, if an attack were to still happen, the organization again needs complete visibility to identify how and from where the attacker entered the network.

Fundamentals: What Sets Containers Apart from Virtual Machines

Containers have fast become one of the most efficient ways of virtually deploying applications, offering more agility than a virtual machine (VM) can typically provide. Both containers and VMs are great tools for managing resources and application deployment, but what is the difference between the two, and how do we manage containers?

The top 5 benefits of peering

The internet is a network of networks, and how and where those networks interconnect determines the efficacy of the service. How networks exchange traffic on the internet varies. Broadly speaking there are three different approaches: A direct connection via a transit provider, a private interconnection between two networks, or peering at an internet exchange (IX) point - a co-location hub that enables members of the IX to interconnect.

Set up instant SNMP monitoring with the new SNMP integration in Grafana Cloud

Simple Network Management Protocol (SNMP) is an internet protocol that is used to collect information about network devices and manage them. Most of the modern devices connected to a network support SNMP, such as routers, switches, servers, printers, and more. There are three different versions of SNMP (v1, v2, and v3). It most commonly operates on UDP ports 161 and 162. The most common versions being used are v1 and v2. The data can be collected from a network device through SNMP via polling.