Operations | Monitoring | ITSM | DevOps | Cloud

Networks

The latest News and Information on IT Networks and related technologies.

How Does Networking Work with Istio?

As organizations continue to digitally transform and expand their networks via cloud and multi-cloud environments, it has become increasingly critical to protect microservices and data flow. Implementing advanced technology such as service mesh helps your team secure data networks and manage system access policies by matching user intentions to workload states. Service meshes like Istio support the latest software application trends like containerization and microservice infrastructures.

Kubernetes Gateway API (Everything You Should Know)

The Kubernetes networking landscape is shifting. The traditional Kubernetes Ingress approach is being complemented and, in some cases, replaced by a more powerful, flexible, and extensible standard: the Kubernetes Gateway API. Kubernetes has become the go-to platform for orchestrating and managing containerized applications. A key aspect of Kubernetes that's crucial for the functionality of these applications? Networking.

Leveraging Microsoft Network Monitoring for IT Professionals

Imagine having the power to keep your organization's network in tip-top shape and ensure those essential Microsoft apps are running like greased lightning. In this blog post, we'll unravel the mysteries of Microsoft Network Monitoring, arm you with the knowledge to deploy it like a pro, and help you troubleshoot network performance issues affecting key Microsoft apps and services like Teams, Office 365, Sharepoint, and more.

Enable real-time updates with new integrations of webhooks with NetFlow Analyzer

A webhook, or web callback, is a user-defined HTTP callback used to alter the behavior of a webpage or application. It is triggered by specific events in a web application, such as receiving an SMS message or phone call. When the webhook is triggered, the source application sends an HTTP request, usually in the form of a POST or GET request, to the URL configured for the webhook.

SolarWinds Day: Secure By Design (6/28/23)

Join us for this SolarWinds Day: Secure by Design virtual event as we explore the importance of public/private partnerships to secure our common cyberinfrastructure. Hosted by SolarWinds CISO and VP of Security Tim Brown, this event includes a bipartisan panel of government leaders discussing the United States National Cybersecurity Strategy, its related frameworks, and the nature of today’s cyber risks.

Top 4 Methods Used to Attack Networks (And How to Defend)

Threat actors use a number of different techniques to gain access to company networks so that they can deliver ransomware payloads. In this blog, we look at four of the most common techniques currently being used to attack networks. The intent is to help MSPs and IT admins understand where the threats are coming from, and then where to focus their attention in order to protect their (or their customers’) networks.

Top 3 public cloud costs to watch

“We moved to the cloud and now everything is more expensive!” Unfortunately, this is a common utterance from companies that have made the leap to a public cloud-based architecture, and a slowdown in adoption growth seen during the pandemic is hitting providers big and small as organisations rationalise cloud spend in the face of rising costs. The good news is these costs can typically be reined in without too much disruption or the need to retreat from the cloud.