Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on IT Networks and related technologies.

Can Network Monitoring Identify Security Threats? Here's What to Know

By continuously monitoring network activity and assets, network monitoring plays a key role in identifying cybersecurity threats. The network monitoring process gathers important data that can be used in analytics or in conjunction with cybersecurity applications to rapidly identify and respond to threats.

Troubleshooting SD-WAN Performance Problems

Software-Defined Wide Area Network (SD-WAN) technology is revolutionizing the way organizations manage their network traffic. With its ability to decouple the data plane from the control plane, SD-WAN provides organizations with a more flexible, scalable, and cost-effective solution for managing their network traffic. However, understanding and troubleshooting SD-WAN performance can be a challenge, especially when it comes to the underlying physical network, or underlay.

How to Decode the Hidden Information from Traceroute DNS

In the vast landscape of the internet, data travels across networks, hopping from one server to another, often traversing great distances. Have you ever wondered about the journey your data takes when you send a request to a website or connect to a server? Traceroute DNS is a powerful tool that unveils the mysterious path taken by your data, revealing the intermediate nodes it encounters along the way.

From logs to insights: Using Firewall Analyzer to monitor Squid proxy activity

Squid proxies are among the most popular open-source proxy servers preferred by companies across the globe to keep their networks safe and boost performance. Since Squid proxy’s release in 1996, companies have preferred it for its high-performance proxying, forwarding, and caching functions. Squid proxy logs contain information about the HTTP traffic passing through a server. This includes the source IP, destination IP, time of the request, and accessed URL.

Defined and Explained: IT Infrastructure Monitoring

Modern IT environments and networks are more complicated and distributed than ever before, spanning public clouds, private clouds, edge locations and on-premise data centers. What once worked well—manual or simple monitoring tools—can no longer ensure end-to-end visibility within complex networks. How can you monitor what you can’t see? Fortunately, you now have access to a new generation of monitoring tools designed for the hybrid network.

Mind Your MANRS: A Safer Internet Through Secure Global Routing

We access most of the applications we use today over the internet, which means securing global routing matters to all of us. Surprisingly, the most common method is through trust relationships. MANRS, or the Mutually Agreed Norms for Routing Security, is an initiative to secure internet routing through a community of network practitioners to facilitate open communication, accountability, and the sharing of information.

Perfecting the Customer & Employee Digital Experience featuring TMNAS

Hybrid and remote work are here to stay – and that creates major challenges for enterprise IT teams responsible for managing internal and external end users. When a user can’t connect, you have to quickly identify where the issue is. But, in a remote world where you no longer control the full network, issues are even harder to pinpoint and resolve. Is the issue with the device? The ISP? The network? A SaaS App? The list goes on.