Operations | Monitoring | ITSM | DevOps | Cloud

Networks

The latest News and Information on IT Networks and related technologies.

Auvik Road Map Webinar - Q4 2020

Since our last roadmap update in May, we’ve released syslog, integrations with multiple new apps like ServiceNow, a new and improved application classifier in TrafficInsights to better identify your traffic mix, and a whole lot more. Now, we invite you to a sneak peek into what’s ahead for the rest of 2020 and early ‘21. Auvik VP of Product Management Patrick Albert will walk you through what’s on the Auvik development calendar and what features and functionalities you can expect to see on your dashboard in the coming months.

Tackling networking issues between users and cloud apps

By extending the capabilities of traditional network visibility, cloud adoption no longer comes at the cost of losing control over the quality of mission-critical systems. Even when employees can connect to an app from a mobile phone via places like a crowded airport Wi-Fi, with Flowmon's support of the cloud-native Packet Mirroring function, NetOps can ensure smooth service. This session will demonstrate how to identify the precise nature and origin of networking issues between your clients and apps hosted in Google Cloud Services.

Common and Disastrous Network Monitoring Mistakes and How to Avoid Them

If you run a sizable enterprise, your network is probably sprawling. You also probably have a network management or IT security team on the payroll to handle monitoring. Their job is to check the network for potential security intrusions, make sure resources aren’t overloaded in one area, and otherwise ensure that things run smoothly.

Vabi gains total visibility into its network using OpManager and Firewall Analyzer

Vabi is a Netherlands-based company that provides “real estate data in order, for everyone.” Since 1972, the company has focused on making software that calculates the performance of buildings. Nine out of 10 utility buildings in the country have been simulated with Vabi’s sustainable model. Vabi has widened its scope from making calculations for construction and installation technology to making building data accessible to everyone.

Top Three API Tips For Network Automation

APIs represent the new frontier for CTOs - offering limitless potential to orchestrate and automate applications, services and networks. In our recent webinar, PCCW Global’s CTO Paul Gampe and AVP of New Technologies Shahar Steiff looked at some of the opportunities and challenges that APIs are presenting for CTOs with the automation of networks. Here we share three of their top tips.

Managing Network Configuration Changes Five Best Practices

Do you know what the most common cause of network outages and performance problems is? Misconfiguration. For as much time and energy as people spend talking about issues such as infrastructure and cybercrime, the truth is that basic low-level configuration challenges are still the biggest “threat” to properly-functioning networks.

Network Monitoring Just Became More Secure, Optimized, and Efficient

The entire Motadata team feels elated in informing you that Motadata Upgrade Release 7.6.400 has been rolled out and is available for installation from October 2020. We understand that many of our customers are already generating value, cost-efficiencies, and competitive edge with their existing Motadata version. But the update has been engineered to augment the entire platform’s value-proposition and making it an obvious choice for an upgrade.

IT security under attack blog series: Instant domain persistence by registering a rogue domain controller

In this blog in the IT security under attack series, we will learn about an advanced Active Directory (AD) domain controller (DC) attack to obtain persistence in AD environments. Dubbed DCShadow, this is a late-stage kill chain attack that allows a threat actor with admin (domain or enterprise admin) credentials to leverage the replication mechanism in AD to register a rogue domain controller in order to inject backdoor changes to an AD domain.