Operations | Monitoring | ITSM | DevOps | Cloud

Networks

The latest News and Information on IT Networks and related technologies.

Announcing HAProxy 2.2

HAProxy Technologies is excited to announce the release of HAProxy 2.2, featuring a fully dynamic SSL certificate storage, a native response generator, an overhaul to its health checking system, and advanced ring logging with syslog over TCP. Watch our on-demand webinar Ask Me Anything About HAProxy 2.2. If you missed the webinar about HAProxy 2.2, you can watch it on-demand as well.

Managing IT Risk When Everyone's Working Remote

Cybersecurity has always been an evolving challenge for IT teams—even before the pandemic and subsequent mass exodus to the home office. At the Protect & Streamline Summit for IT Leaders, experts from the IT and cybersecurity space came together to share advice for IT leaders scrambling to contend with a new set of business risks. Read on for key takeaways or access all session recordings for a deeper dive.

Application Slowness Troubleshooting:Prove it is not the Network!

This article was originally published on NetworkDataPedia. The one complaint that an IT administrator dreads to receive is one where an end user says, “My application is slow!”. The application in question can be a web application, an enterprise application like SAP, Microsoft SharePoint, or a SaaS application like Salesforce or Office 365.

Key Fortinet and Flowmon Integrations: Automated Incident Detection and Response

Flowmon has recently joined Fortinet’s Open Fabric Ecosystem by integrating with FortiGate and FortiSIEM. This cooperation brings automated system for threat detection and response, blocking security risks in their infancy, and giving time to administrators to carry out forensics.

Go Beyond Audit: Network Monitoring for BFSI Companies

With pandemic’s sudden hitting, most offices and companies had to quickly move their operations and have an apt Work-from-Home policy defined, the technology gap in both the front end and the companies’ back-end operations came in scathing review , While BFSI institutions also had a WFH policy, there services were deemed to be necessary. Since people couldn’t line up outside banks, the banks had to keep their technology fine-tuned to assist their customers in these testing times.

How an Oil & Gas conglomerate automated their IT service delivery

Our client is one of the biggest oil and gas conglomerates in India, contributing to around 75% of Indian domestic production. They have been in business for over 60 years, currently employing around 30,000 people. With decades of growth, they have entered into different ancillary companies and expanded globally. The expansion has led to several offices, branches, desks, and teams spread across geographies.

Discovery Net Scan: the best network discovery software

Previously, in Pandora FMS blog, we learnt a little about the great revolution that the Discovery feature brought to Pandora FMS. This tool reduces the complexity of certain existing features in Pandora FMS, and also introduces new tools that turn this software into a complete monitoring system. In today’s episode we are going to take a walk through the bowels of one of its tools, Discovery Net Scan, which is an exponential upgrade to recon tasks. Are you ready?

Why a Zero-Trust Network Is More Desirable-and Achievable-Than Ever

A few years ago I wrote a blog article about the zero-trust network security model and why I thought it was something every organization should be thinking about implementing. While I still believe that to be true—probably more true than ever, in fact—the landscape since then has changed a great deal, particularly because of the increase in cloud-based services, and zero-trust is now an extremely achievable goal.

What Does My Website Look Like From China? Test and Monitor Performance from China

In this current age of the Internet, it’s a common practice to build a website to run your online business. With the networks all around the world, theoretically, you can do business boundlessly. However, like each country has its boundary, the world of Internet is not a world without any control. In fact, every country has its own laws and rules toward this virtual world. And the case is especially different, when China’s Internet environment is involved.