Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on IT Networks and related technologies.

Agent vs Agentless Monitoring: Which is Best?

Agent-based and agentless monitoring are the two main approaches network monitoring tools use to capture and report data from network devices. As the names suggest, the difference between the two is pretty simple: someone has to install extra software(the agent) for agent-based monitoring to work. But, that doesn’t explain why an IT team or an MSP would choose agent-based or agentless monitoring.

Best Practice Series: Securing the Monitoring System

Network security makes the headlines at least once per day – and usually for the wrong reasons. In today's world, ensuring and maintaining a secure deployment is of utmost importance. Did you know that WhatsUp Gold provides several important security features that you can configure and manage to maintain a secure deployment? These features can help you to defend against unauthorized access to the WhatsUp Gold server as well as to devices monitored by WhatsUp Gold.

Announcing HAProxy Data Plane API 2.6

In HAProxy Data Plane API version 2.6, we continued the effort of expanding support for HAProxy configuration keywords, as this has been the priority with this release cycle, and it will be in the next one too to meet our goal of achieving complete feature parity with both the HAProxy configuration and Runtime API. This will enable you to use HAProxy Data Plane API for configuring HAProxy without any gaps in functionality.

Phil Gervasi on Network Observability and Cisco Live | Network AF Episode 20

Phil Gervasi, Kentik's Head of Technical Evangelism stops by Network AF today to speak with host Avi Freedman about all things network observability and to recap their experiences at Cisco Live. Phil was a network engineer for 15 years before switching to marketing and finding his way into technical evangelism. In this conversation the two focus on building a foundation for data mining and collecting information that could better inform network intelligence and insights from observability platforms like Kentik.

Voice Network Fraud: How to Fight Back with Automated Threat Prevention

Telecommunications fraud is estimated to be a $39 billion a year problem according to the Communications Fraud Control Association. Despite that, less than 50% of enterprises* have implemented any sort of strategy to address fraud in their voice infrastructure. Firewalls and SBCs are not enough to provide a secure voice network. Enterprises need a more complete approach to network security—one that encompasses the unique vulnerabilities of real-time communications systems—to preempt issues and protect the organization as a whole.