Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on IT Networks and related technologies.

How to Select the Best Network Monitoring Tool for Your Needs

When it comes to protecting your company’s important data and network, it doesn’t matter what size your firm is, keeping things safe and running smoothly should be a top priority. For this reason, many invest in network monitoring tools like Pandora FMS. This is because we offer a software solution to make sure your network is always safe and secure around the clock. Let’s learn a bit more about the process of network monitoring and why it’s so important here!

Installing the HAProxy Kubernetes Ingress Controller using Helm

Helm, the Kubernetes package manager, revamps the way teams manage their Kubernetes resources and allows them to deploy applications in a consistent and reliable way. It is a valuable tool in a continuous delivery pipeline, with support for quick updates and rollbacks. At HAProxy Technologies, we offer Helm as the preferred method for installing the HAProxy Kubernetes Ingress Controller, and we’ll show you how to customize that installation to fit your use case.

Use HAProxy Response Policies to Stop Threats

HAProxy gives you an arsenal of sophisticated countermeasures including deny, tarpit, silent drop, reject, and shadowban to stop malicious users. There are two phases to stopping malicious users from abusing your website and online applications. Step one is detection, step two is deploying countermeasures. HAProxy is more powerful than nearly every other load balancer when it comes to both detection and countermeasures.

ITOM podcast episode 1 is out! Learn the basics of VPNs to enable your remote workforce

The wait is finally over. The first episode of our weekly podcast series aimed to alleviate all your remote work hassles is out. The efficacy of remote operations depends on a robust virtual private network (VPN). VPNs help facilitate remote work by acting as a conduit between an organization’s remote workers and its private network. VPNs ensure a safe passage for the transmission of business-critical data and grants end users access to on-premises services to maintain operational continuity.

Ensuring Availability and Security for Remote Workers

The year 2020 has seen various changes throughout the world but no change has seen more of an impact than the Corona-virus. During this epidemic, workers from all industries have moved from a traditional office-based role to WFH (Working From Home). It’s known as a business transforms it brings new risks associated with it. New and emerging technologies and the practices they involve require operational, policy and security measures to be implemented and evolved over time.

The No Sweat Guide to Effective Switch Management

An on-site switch plays a critical role in a network: that of connecting your users to the rest of the IT infrastructure. Don’t think of that jack in the wall or under the cubicle as a simple Ethernet port. As part of effective switch management, you need to think of it as the mission-critical gateway to IT services that it is.

Get a live view of network performance with OpManager's Real-time Dashboard

Although network monitoring is an unenviable task, it must be done to sustain your network’s health. But what if you had a real-time report containing only key metrics, revealing how your network is doing without overloading you with information? This would (1) assure you that there are no aberrations in your network and (2) give you peace of mind.

Improved FortiGate Integration

The new release of FortiOS 6.4 from 31 March 2020 brings a new and interesting feature of using webhooks for external API calls and enable automation stitches, which are easy to configure in FortiGate UI and allow you to run multiple actions. This led us to revise our integration script to utilize this functionality and allow administrators to easily configure different levels of mitigation with the webhooks.

Network operating system: operation, history and monitoring

In the early days of telephony, there were few people who had phone numbers in every town and city. There were just a few numbers to remember and if your brain failed, you could check with a telephone operator, women who always knew (and know) how to listen. Let’s see how a network operating system was born in the middle of the 20th century, right at the center of telephone networks.