Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

How we keep N-central updated and secure

Following the security issues in the MSP market over the past 24 months, our customers, who are understandably concerned, have been asking what we do to keep the N-central® appliance (hosted or on-premises) updated and secure for them. I will do my best in this short article to outline how our engineering team keeps up with security. Please note this is valid as of the time of writing, but can change at any point.

INFRA:HALT 14 New Security Vulnerabilities Found in NicheStack

NicheStack is a TCP/IP network stack commonly used in millions of Operational Technology (OT) devices around the world, including in critical infrastructure such as manufacturing plants, power generation/transmission/distribution, water treatment, and more. JFrog’s security research team (formerly Vdoo), together with Forescout Research Labs, recently discovered 14 new security vulnerabilities affecting the NicheStack TCP/IP stack.

Baystate Health Employs DX NetOps to Manage Pandemic-Related Demand and Ensure 100% Network Availability

As we all know, the pandemic changed everything, from the way we shopped to the way we received healthcare. It introduced a whole new way to interact with healthcare professionals for yearly check-ups, consultations, and more. The pandemic also put the network in the spotlight as a critical method to deliver reliable applications experiences. All, if not most medical professionals used the telehealth application as one of the only ways to provide quality patient care.

How Should an MSP Evaluate a PSA Solution?

Managed services providers (MSPs) juggle a lot of responsibilities. They have to address rapidly changing customer demands while still providing high-quality service, managing increasingly complex environments, evolving their service offerings, and much moreyou’re your business scales, it’s hard to accomplish these goals without the help of professional services automation (PSA) software.

Curb network incidents fast with cross-domain correlation analysis

For many CSPs, increasingly complex networks and immature technological solutions result in a typically long time to the detection and resolution of incidents that impact the customer experience, the brand’s reputation, and the bottom line. With RAN, Mobile and IP core, transport and applications and dozens of other integrated components, the network is one of the most complex areas to monitor.

6 Most Common Network Problems

Intermittent network problems frustrate users, affect productivity levels, overwhelm your IT team, and are a pain for network administrators to solve. There are many problems that can affect network performance, and some of them are very complex to identify and understand. To help you proactively identify network problems that may be plaguing your network, we’re running you through some of the most common network problems!

Why Should My Business Consider Private And Direct Connections To Huawei Cloud?

The rapid growth of China's public cloud market and the increased spend on cloud services has seen Huawei Cloud become an increasingly popular option for enterprises. Here we look at some of the advantages of using private connections between Huawei Cloud data centres and your on-premise or colocation environment.

Kemp Flowmon ADS and Check Point Integration: Automated incident detection and response

We have recently published a script for the integration of the Anomaly Detection System (ADS) with a Check Point firewall. This ensures automated threat detection and response where attackers are blocked from accessing the network resources and causing even further harm. The previous integration with Fortinet describes a way of stopping the attacker at the perimeter. The following use case is largely the same, except with a Check Point firewall instead.