Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on IT Networks and related technologies.

New DX UIM Release: Start Monitoring New Linux Distributions on Day 1

From DX UIM 20.4 CU4 onward (that is, releases that have robot version 9.36 or above), robots automatically support Linux versions with newer GNU C Library (commonly known as “glibc”) versions. Prior to CU4, DX UIM robots needed certification and a release to provide support or compatibility with newer Linux operating systems that have a higher glibc version.

Augmenting behavior-based network detection with signature-based methods

Network detection tools utilize one of two prominent approaches for threat detection: AI-driven behavior-based methods capable of identifying early indicators of compromise, and signature-based ones, which flag known attacks and common CVEs. While these systems operate on distinct principles, their combination forms more robust defense mechanism, helps to consolidate tools, provides richer threat context and improves compliance.

What Is an IP Address Management Service and Why Might You Need It?

If you're managing a network, chances are that the need for IP Address Management (IPAM) is something you've already become familiar with. The ability to effortlessly and effectively manage your IP allocations will make your life much easier no matter what size of organization you work for. It can help streamline efforts by reducing complexity, minimizing manual intervention when configuring new devices or services within an enterprise intranet, and proactively resolving problems related to limited resources like addresses.

How to Configure a Linux Firewall: The Ultimate Guide

A firewall stands as a digital gatekeeper, meticulously sifting through network traffic and deciding what may pass. This protective shield, fundamental to cybersecurity, is integral in the Linux world. The Linux kernel itself is effectively a de facto packet switching firewall, crafted as it is around the principles of packet filtering at the most fundamental operating system level, thus exemplifying the pivotal role of firewalls in system security.

ICMP Required for Traceroute and Network Diagnostics

As previously detailed on the Exoprise blog, the ICMP (Internet Control Message Protocol) is crucial for troubleshooting, monitoring, and optimizing network performance in today’s Internet-connected world. Despite historical security concerns, disabling ICMP is unnecessary and hampers network troubleshooting efforts. Modern firewalls can effectively manage the security risks associated with ICMP.

How AI is Changing Modern Networking

Artificial intelligence has changed the landscape of technology, especially as we collect and analyze vast amounts of data. As AI workloads are distributed among compute nodes and across data centers, what problems are posed for traditional networking, and what solutions can we discover? This live discussion between Justin Ryburn, Field CTO at Kentik, and Phillip Gervasi, Director of Technical Evangelism at Kentik, dives deep into the current state of data center networking in the age of AI.