Operations | Monitoring | ITSM | DevOps | Cloud

Networks

The latest News and Information on IT Networks and related technologies.

How to Monitor Changes to Hardware and Software Configurations

Server configuration changes are a major cause of application outages and performance issues. Changes having the greatest impact often are the simplest. Memory pulled from one server to boost another server’s performance can leave the lingering applications starved. Adding new software can automatically update configurations and cause another application to become inoperable. Having visibility into when these types of changes occur is critical to resolving application availability and performance, fast. Learn how to achieve this visibility with SolarWinds® Server Configuration Monitor.

Use SNMP to monitor whatever you need

SNMP (Simple Network Management Protocol) is a popular protocol family, supported by majority of network devices, as well as available for every more or less popular operating system. One of most useful features of modern SNMP servers implementations is user-defined extensions. Simply put, one can instruct SNMP server to hold data returned by any user-defined action (such as output printed by a script or program). That can be used to use SNMP as container protocol, to deliver whatever data you need.

Secret Keys to the Password Kingdom

Building trust with customers is a must for MSPs. And because of the unique nature of MSPs, it’s not always easy. Your customers aren’t simply giving you administrative access to a few admin accounts—they’re sharing secrets which must be securely managed across all the systems, apps, and users you manage for them. Passwords, SSH keys, licenses, cloud infrastructure logins, and SaaS portal accounts are just the beginning. To solve issues quickly, your technicians can’t waste time locating the credentials needed to resolve issues and make users happy.

Predictive Analytics to Improve Decision Making

Predictive analytics for networks are helping businesses optimize their network performance, anticipate network capacity related requirements, and eventually forecast future much more efficiently than ever. Gartner has estimated the value of network monitoring software market at roughly $2.1 Billion, this figure is presently increasing at a growth rate of 15.9% annually. The demand for predictive analytics in network monitoring software has grown beyond enterprises and datacentres.

Account Takeover IS Your Problem

Phishing and malware are scary enough, but the number-one tactic used by bad actors to get access to and take over accounts is something different: using compromised credentials. Why? Because it’s so easy. Data breaches happen almost constantly, and credentials get leaked. At the same time, people are prone to reuse the same few passwords across all their accounts. These two facts spell trouble, as it’s almost impossible for an IT professional to know if working credentials to their company email or CRM are floating around the dark web. Almost impossible that is, until now.

Make your monitors nearly real-time

Most of existing IPHost monitor types are passive, meaning they are being polled by IPHost – directly, or via remote network agent. There are two “active” monitors, that perform “Event” type alert, when receiving data from remote host: Syslog monitor and SNMP Generic Trap monitor. Although it’s not possible to transform all possible passive monitors to active, there are several approaches to make monitoring nearly real-time in certain situations.

Network baseline: new technologies, new challenges

The issue of network baseline arose quite some time ago. Everything started from the understanding that networks are not static entities, but are a set of elements that change over time. It was also understood that networks are not only made up of physical and tangible elements, such as a router or a switch, but we must also have more abstract elements, such as the traffic pattern over a WAN link, for example.

Auvik Turns 8: A Look Back on Our First 8 Years

2011 was a big year for pop culture: Prince William and Kate Middleton tied the knot, Ashton Kutcher replaced Charlie Sheen in Two and a Half Men, and the theatrical release of Harry Potter and the Deathly Hallows: Part 2 marked the end of an era. While our eyes were turned to the screen, something else was happening—two former co-workers were deciding it was time to start a new adventure together. Know what that means?