Operations | Monitoring | ITSM | DevOps | Cloud

Networks

The latest News and Information on IT Networks and related technologies.

Kubernetes Network Policy Introduction

Kubernetes Network Policy is the native way to implement network security controls in Kubernetes. Calico Policy is a superset of Kubernetes Network Policy that adds additional capabilities that help meet common real-world use cases. In this talk, we will educate you on the basics of Kubernetes Network Policy, the differences with Calico Policy, example use cases, and demos. You’ll walk away from this session with knowledge that will help you decide which network policy is right for you.

Building Stellar Orion Reports From the Ground Up - SolarWinds Lab Episode #88

Reports are among one of the most powerful and ubiquitous aspects of the Orion Platform. Despite being right at people's fingertips, they're often overlooked or under-appreciated as a tool to provide robust insight and monitoring awareness. Part of that might be due to users not feeling comfortable with the process of building reports. In this episode of SolarWinds Lab, Head Geek Chrystal Taylor will go back to the basics with you -- covering the process of building a report and showing all of the incredible features standard in the web-based report writer. Then, she'll take it a step further, showing some of the more sophisticated results you can get with just a few simple options.

Early Ransomware Detection and Response

The inability to access critical digital assets can be catastrophic to your operations. Ransomware is therefore one the scariest, but also most common online assaults. Join this webinar and learn how Flowmon, a leading network detection and response tool, helps to cover visibility gaps, detect ransomware and respond even prior to locking down digital assets. We will go through Flowmon's features via live demo and show you how to trace attackers’ footprints across the system.

Achieve Greater Network Visibility with LogicMonitor and Cisco SD-WAN

SD-WAN (Software-Defined Wide Area Networking) centralizes and automates the configuration of network devices and how they route traffic. This is increasingly important as not all network traffic is created equal; there are specific business-critical applications that are relied on more heavily than others. In addition to intelligent routing benefits, SD-WAN also allows IT managers to deploy internet-connectivity quickly, reliability, and securely.

What's Next After Connectivity?

Across the world, many network operators, fiber network wholesalers, municipalities, and local authorities are in a race to put fiber in the ground. New techniques and specialized tools have reduced the time it takes to deploy optical fiber and increased the amount of fiber held in a single duct, this makes the dream of providing fiber to every premise a cost-effective reality.

From OpenVPN to Pritunl VPN: The transition

Usually, organizations use an internal network to prevent unauthorized people from connecting to their private network. By using their own network infrastructure and connectivity, they can maintain their desirable level of security for their data. But it would be convenient for users to connect to that private network while they are away from the office through their own internet connection.

So, You Inherited Orion

So, you’ve inherited a SolarWinds Orion environment! Do you feel disoriented or like you’ve landed on the island of misfit engineers? Think again. Over 50% of the respondents to a recent survey indicate they’re in the exact same situation as you! In this session, SolarWinds Head Geek™ Leon Adato joins members of the SolarWinds UX team for a roundtable discussion of common questions, like “Should I just start over?” and “How do I make a so-so implementation better?”

Four Strategies for Securing the Tactical Edge

The military has invested significant time and money implementing edge computing on the battlefield. The Army’s efforts to leverage the tactical cloud to process data on the edge gets information into soldiers’ hands more quickly, allowing them to make decisions in near-real time. But these benefits come with significant challenges, particularly regarding security. The more endpoints, the larger the potential attack surface and the greater the risk.

10 Computer Networking Books Every Network Manager Should Read

Let’s be honest: As a network manager, you’re responsible for knowing a little bit about everything when it comes to computer networking. From fundamentals to anticipating future tech changes, there’s a lot of ground to cover. To keep up, you need to keep learning. If you’re wondering where to start, this list of 10 computer networking books can help.