Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

10 Tools for Monitoring Mobile Apps from a Network Point of View

With so many apps to choose from, mobile users no longer have much patience for apps that don’t work well. This isn’t just about bugs and crashes; users also think about how fast the app works and how much battery it uses. But have you ever thought about what would happen to the business if your live applications running on the client’s systems went down or didn’t work as expected?

Why OpManager is the perfect tool to detect and troubleshoot Wi-Fi performance issues

Wi-Fi has untangled humanity, quite literally. Those jumbled Ethernet cables with their confusing ports are banished to backstage. Now, all we need is one connection to a Wi-Fi router and voila! Internet. Wi-Fi networks simplify your IT infrastructure. WLAN networks makes an office look less like a scene from The Matrix and more like a creative workspace, but it can bring an array of difficulties as well. Unlike the sturdy Ethernet cable, Wi-Fi connections fluctuate.

6 Best Network Inventory Documentation Tools

Although network inventory documentation isn’t the most glamorous task, it is essential for the success of any IT department. According to Steady Networks, “Workers spend about 22 minutes each day dealing with some type of IT issue.” An accurate network inventory can greatly reduce the time it takes for internal IT to identify and solve issues.

Anatomy of an OTT traffic surge: Thursday Night Football on Amazon Prime Video

This fall Amazon Prime Video became the exclusive broadcaster of the NFL’s Thursday Night Football. This move continued Prime Video’s push into the lucrative world of live sports broadcasting. While they had previously aired TNF, as it is known, this is the first season Amazon Prime Video has exclusive rights to broadcast these games. As you can imagine, airing these games has led to a surge in traffic for this OTT service.

Network Log Archiving = Perfect Backwards Visibility

Network monitoring is ideal for getting a real-time view of your connected environment, and with reports, you can look back in time too. Logs are key to this rear-view mirror look, as they contain all the data for all the elements you are monitoring. But without network log archiving, you can only look back so far. Did you know that according to an IBM/Ponemon study, it takes an average of 287 days to discover and contain a data breach?

Virtual CISO Services: A New Revenue Stream for MSPs?

As you look to optimize your MSP’s growing business, it’s going to become more and more important to maintain an acceptable return on your investment. To do this, you’ll need to find services that increase your gross margin on every client engagement. Virtual CISO services can greatly help in this function. While solutions like Auvik already help MSPs have visibility inside of client networks, we want to take this a step further with the addition of vCISO services.