Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Simplifying security auditing, part 5: Detecting network attacks

Anyone trying to access resources in your network needs to interact with your network devices: firewalls, routers, switches, and IDS/IPSs. Each of these devices generate syslogs that contain important security information and must be audited to gain complete visibility into the activities occurring in your network. Most SIEM solutions, including our own Log360, can collect and analyze syslogs in real time and instantly alert security teams if any security event of interest occurs.

LPWAN as a communication base for IoT

LPWAN (Low Power Wide Area Network), also known as LPWA or LPN, is a wireless data transport protocol that is now understood as one of the basic protocols for the implementation of IoT. In order to have a better idea of the relevance of LPWAN we can consider the prediction made by statisca.com of a steady increase in the number of LPWAN devices connected around the world, expecting this number to reach around 3.5 billion devices by 2021.

Auvik Use Case #2: Automatically Acquiring Network Inventory

To effectively support and manage a client’s network, you need to know what’s really on the network. Sure, a tour of the IT environment will help. You’ll be able to slowly document information about the devices you can see, like the make, model, and serial number. But what about the devices you can’t see—or that the client doesn’t know about?

MSPs Face Highly Fragmented Network Hardware Market

WATERLOO, ON / August 28, 2018 — The network hardware market is highly fragmented, with hundreds of equipment vendors vying for market share, says a new report from Auvik Networks. There’s intense competition in the network switch, router, firewall, and access point hardware markets, with upwards of 40 vendors competing in each category.

Managing Network Vendor Diversity: The MSP Challenge

Whether you inherit an IT environment or build it from scratch, managing your clients’ network infrastructure can be a real headache. Keeping clients’ network devices functioning so they stay connected and productive requires complex manual tasks, expensive expertise, and tons of valuable time—that is, if you don’t use software to simplify and automate network management activities.

Feature Spotlight: TCP/UDP Checks

We live in an incredible global economy where workers from all over the world pitch in to complete major products, develop new technology, and change the world. Here at Uptime.com, our workforce is spread across the globe, and we know many of you reading probably have a similar setup. The benefits of hands on a website at all hours of the day are numerous, so long as connectivity remains alive and well. That’s where a TCP/UDP Check provides immeasurable value.

Auvik Use Case #9: Troubleshooting Internal Connectivity

There are few office experiences more frustrating than sending a document to the printer and hearing… nothing. No whirring, no thumping, no document. Your client will probably check if the device is plugged in and turned on, if there’s enough ink, and if paper needs restocking. But if these simple fixes don’t uncover the problem, then they’ll likely call you—and in the past, that meant jumping in the car and driving to the client site.

How to Efficiently Discover Network Resources

Thomas Stocking, co-founder and vice president of product strategy, recently wrote an article titled How to Efficiently Discover Network Resources, featured in The Data Center Journal. The article talks about network discovery tools and processes, and why it’s important to automate and standardize. Many business processes (security management, service delivery and service support) depend on the administrator’s knowledge of the network details.

Configuring SYSLOG / Event Log on a Windows Device

Netmon’s complete Network Monitoring Solution can also be used as a centralized SYSLOG and Windows Event Log Server where you can quickly look through many Servers, Workstations or other Network devices’ SYSLOG and Event Log information without having to log into each individual device to see the same information.

Don't Let These Wi-Fi Pitfalls Trip You Up

When it’s time to add or rework a wireless network for a client, a lot of little things need to line up for the venture to be successful. It’s not enough to simply have an SSID in the air, and if you’re not careful, you risk disrupting your client’s business and damaging your reputation. Though not every business has the same focus, when it comes to Wi-Fi there are a common set of concerns. Make sure these bases are covered.