Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Use HAProxy Response Policies to Stop Threats

HAProxy gives you an arsenal of sophisticated countermeasures including deny, tarpit, silent drop, reject, and shadowban to stop malicious users. There are two phases to stopping malicious users from abusing your website and online applications. Step one is detection, step two is deploying countermeasures. HAProxy is more powerful than nearly every other load balancer when it comes to both detection and countermeasures.

ITOM podcast episode 1 is out! Learn the basics of VPNs to enable your remote workforce

The wait is finally over. The first episode of our weekly podcast series aimed to alleviate all your remote work hassles is out. The efficacy of remote operations depends on a robust virtual private network (VPN). VPNs help facilitate remote work by acting as a conduit between an organization’s remote workers and its private network. VPNs ensure a safe passage for the transmission of business-critical data and grants end users access to on-premises services to maintain operational continuity.

Ensuring Availability and Security for Remote Workers

The year 2020 has seen various changes throughout the world but no change has seen more of an impact than the Corona-virus. During this epidemic, workers from all industries have moved from a traditional office-based role to WFH (Working From Home). It’s known as a business transforms it brings new risks associated with it. New and emerging technologies and the practices they involve require operational, policy and security measures to be implemented and evolved over time.

The No Sweat Guide to Effective Switch Management

An on-site switch plays a critical role in a network: that of connecting your users to the rest of the IT infrastructure. Don’t think of that jack in the wall or under the cubicle as a simple Ethernet port. As part of effective switch management, you need to think of it as the mission-critical gateway to IT services that it is.

Get a live view of network performance with OpManager's Real-time Dashboard

Although network monitoring is an unenviable task, it must be done to sustain your network’s health. But what if you had a real-time report containing only key metrics, revealing how your network is doing without overloading you with information? This would (1) assure you that there are no aberrations in your network and (2) give you peace of mind.

Improved FortiGate Integration

The new release of FortiOS 6.4 from 31 March 2020 brings a new and interesting feature of using webhooks for external API calls and enable automation stitches, which are easy to configure in FortiGate UI and allow you to run multiple actions. This led us to revise our integration script to utilize this functionality and allow administrators to easily configure different levels of mitigation with the webhooks.

Network operating system: operation, history and monitoring

In the early days of telephony, there were few people who had phone numbers in every town and city. There were just a few numbers to remember and if your brain failed, you could check with a telephone operator, women who always knew (and know) how to listen. Let’s see how a network operating system was born in the middle of the 20th century, right at the center of telephone networks.

Introducing the OpUtils mobile app

Troubleshoot your IP addresses and switch ports faster and smarter! Managing and troubleshooting your network IPs and ports effectively can become difficult if hands-on network monitoring by your IT team is required at all times. Ever wondered if you can monitor your IPs and endpoints on the go? If yes, the solution you need is the OpUtils mobile app.

Drive 99.999% Uptime for Your Data Center by Supercharging your NOC

Your NOC data center is vital to your enterprise’s success, due to the fact that it bridges the gap between your computer network and telecommunications infrastructure. This center also enables your enterprise to quickly and effectively identify IT downtime and outages and address these incidents before they damage your enterprise and its stakeholders.