Operations | Monitoring | ITSM | DevOps | Cloud

Networks

The latest News and Information on IT Networks and related technologies.

Use Microsoft Teams as Your Phone System: How to Get Started

Join Dr. E. Brent Kelly, Principal analyst at KelCor & Greg Zweig, Director of Solutions marketing for Ribbon as they discuss the critical thinking required to plan a successful transition to Teams Phone System. Brent regularly provides strategy and counsel to CIOs, CTOs, and technology buyers. More importantly, Dr. Kelly is not afraid to get his hands dirty, having deployed Teams Phone Systems himself; he’ll speak from firsthand experience!

3 Ways to Use Auvik APIs for External Reporting

Every IT team has its own strategies, goals and objectives to help move themselves and their company forward as a whole. As part of this, management relies on the metrics and data reports from their networking department to help signal if the effort is making progress towards those goals and objectives. The data for which lives within the tools and systems used by techs every day.

Ribbon IP and Optical Solutions for Research and Education Networks (RENs)

National and regional research and education networks are strategic assets that bolster economic competitiveness and are also a showcase of high tech excellence. Ribbon has a record of accomplishment worldwide implementing RENs, from national to regional RENs, as well as smaller university networks. Ribbon’s REN solution encompasses a flexible high bandwidth optical backbone, IP connectivity, management and automation, as well as value-added communications services.

How to Measure Network Performance: 5 Network Metrics

As more companies continue to rely on SaaS and cloud applications to run their businesses, it becomes important for them to ensure their network infrastructures can withstand the demand, and that they’re able to offer their services quickly and reliably. Continuous network monitoring can help you ensure that your network is always performing at its highest level. So, we’re running you through exactly how to measure network performance, and what network metrics you should be looking at.

Publishing & Securing Legacy Applications

In the previous blog post, we discussed load balancing essentials and methods of traffic distribution among the real servers. When you publish an application with Kemp LoadMaster you can add lots of extra capabilities on top of the basic load balancing. In this post we’re going to look at ways of securely publishing legacy applications using the LoadMaster Edge Security Pack (ESP) and SSL Acceleration features.

Resolve network security issues efficiently with the Firewall Analyzer-ServiceDesk Plus integration

ManageEngine Firewall Analyzer reviews firewall logs to capture network security threats. It generates alerts upon detecting security threats and attacks, and notifies you, the security administrator, in real time. You can configure alerts to be sent via email, SMS, and more. With these real-time notifications, you can troubleshoot to take instant remedial action. You can also make changes to your firewall policies and configurations to prevent recurring security incidents.

SMTP Ports (25, 587, 465, or 2525) - What is SMTP Port? How to Choose the Best and Right SMTP Port?

It can be difficult to choose an SMTP port. When we set up the Simple Mail Transfer Protocol SMTP Server, the first question that comes to mind is this. Which port is the best for SMTP connections? There are a variety of ports to choose from, but which one should you use? Allow me to take you on a journey through the history of each port. It will give you a good understanding of all of the ports, and then we'll talk about which one is optimal for SMTP connections.

Investigating Network Anomalies - A sample workflow

Network anomalies vary in nature. While some of them are easy to understand at first sight, there are anomalies that require investigation before a resolution can be made. The MITRE ATT&CK framework introduced in Kemp Flowmon ADS 11.3 streamlines the analysis process and gives security analyst additional insight by leveraging knowledge of adversaries' techniques explaining network anomalies via the ATT&CK framework point of view.