Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Integration of PRTG and Flowmon

Get the most out of PRTG and Flowmon by bringing them under one GUI and allowing their complementary functionalities to work together. Until recently, infrastructure and network monitoring were seen as rivals, but today they are rather viewed as complementary technologies. Seek proof with Gartner - they used to be pitted against each other in the Magic Quadrant, but that has now been replaced by the Market Guide, which explains the differences and strong points but does not compare.

Subnetting: What it is and How it Works

Subnetting isn’t hard but I often see even experienced network engineers looking for subnet calculators or trying to count in binary on their fingers. So how about a quick primer? To understand subnets, remember what a subnet is and think about the IP address in binary. A subnet is a range of IP addresses. All the devices in the same subnet can communicate directly with one another without going through any routers.

What are Some of the Perks Offered by Pandora FMS Network Mapper?

When it comes to mapping your network, having the right tools at your disposal can make things much easier, which is why Pandora FMS offers an extensive network mapper, so you can always keep track of your network. Our network mapping tool offers a comprehensive number of features. Our software enables you to mix network monitoring solutions with server monitoring. Here we’re going to discuss some of the biggest perks offered by our network mapper!

The New Model for Network Security: Zero Trust

The old security model, which followed the “trust but verify” method, is broken. That model granted excessive implicit trust that attackers abused, putting the organization at risk from malicious internal actors and allowing unauthorized outsiders wide-reaching access once inside. The new model, Zero Trust networking, presents an approach where the default posture is to deny access.

How Enterprise Alert solves typical problems in network monitoring

A new article in the September issue of LANLine (“Automation creates productivity”) summarizes typical challenges and problems in network monitoring very well and is really worth reading. I would like to briefly discuss some of the issues raised and how our product Enterprise Alert® was developed to solve them. Of course, it is important that especially critical alarms are processed promptly. Even small problems can quickly lead to major failures.

Sponsored Post

Requirements for Branch Office Network Monitoring

For the past 15 years, there's been a shift in how people work, where they work from and how they connect to "work". Employees are no longer tethered to headquarters, their offices or tied to slower complicated VPN services. Additionally, the way people work and where they work from has changed. Along with flexible work hours, employees want workplace flexibility. And with such a competitive job market, employers have to deliver! Flexible work environments offer tremendous benefits such as improved productivity and morale, reduced stress levels and better work-life balance which builds trust and commitment.

Hassle-free IP and switch port management with NetFlow Analyzer's IPAM SPM add-on

“The IP of that device? Let me look it up in this spreadsheet with a never-ending list of IP addresses! *sigh*” Sound familiar? Do you often need to block a certain port allowing unauthorized traffic, get the MAC address of the IP taking up most of your bandwidth, or scan for rogue devices entering your network? Then the IPAM SPM add-on is the solution for you!

5 reasons your network needs an advanced IP scanner

With networks continually scaling to meet business needs, advanced IP scanning has become a crucial task for network admins to ensure network availability and performance. Scanning IP addresses can be challenging in large networks, which often include wired and wireless devices with dynamic IPs, multiple DNS, DHCP configurations, and complex subnets.

Learn how monitoring VPNs enhances your remote workforce's productivity: The ITOM podcast [Episode 3]

The ITOM podcast returns with yet another episode aimed to alleviate all your remote work woes. In the last episode, we drilled into the nuances of VPN security, encryption, hashing algorithms, certification authorities, and much more. Now we’ll discuss the practical implications of VPNs on remote work. VPNs have become many organizations’ best bet to help maintain business continuity in this era of remote work.