Are Zombies Eating the Brains of Your Network?
Are you battling network zombies – or problems that you thought were dead which suddenly spring back to life? If so, you are not alone, as these creatures represent the most troublesome foe of the modern-day IT administrator. They are impossible to predict, appearing randomly without warning. They are also dangerous, resulting in downtime and lost productivity. And without the right approach, they are nearly impossible to locate and exterminate.
In the comic books and movies, a swift headshot is all that’s required to eradicate a zombie. In the world of IT however, the process is much more challenging, but certainly not impossible. As we will illustrate, by adopting a more efficient approach – one that leverages an application performance monitoring solution – IT departments can effectively neutralize these problems once and for all.
EMA Network Monitoring Vendor Landscape
Enterprise Management Associates (EMA) analysts define the term “Enterprise Network Availability Monitoring System” (ENAMS) - as a network-centric monitoring solution used by enterprise network operations and engineering teams to discover, monitor, assess, troubleshoot, and manage medium to large enterprise network infrastructures. In all, 17 products from 16 vendor suppliers are reviewed and compared in this study.
Buyer's Guide to Automated Layer 2 Discovery & Mapping
Layer 2 discovery creates a detailed view of network interconnections, down to the devices connected to a switch, subnet details, and VLAN information. With layer 2, you can automatically discover everything connected to a network — devices, servers, virtual machines, deployed software, VLANs, port-to-port connectivity, and other resources — has tremendous benefit for IT professionals looking to save time and be compliance-ready.
A comprehensive Layer 2 discovery & mapping solution will automatically discover, map, document and inventory the entire IT infrastructure including network devices, servers, workstations, deployed software, VMware virtual machines, VLANs and port-to-port connectivity.
Our Layer 2 Buyer's Guide gives you insight into the four critical components to look for when deciding on Layer 2 Discovery & Mapping Tools
Overcome 7 Performance Challenges with a New Class of IT Monitoring Solutions
For years there has been a perception of a wide performance and functionality gap between the low-cost IT monitoring solutions aimed at small and medium-size businesses and the “big four” monitoring products that start in the low six figures and climb rapidly from there.
The IT organization at a British university, with campuses in London and five other locations, thought they had no choice but to select one of these expensive systems to achieve their mapping and monitoring goals for keeping students, professors and staff up and running with only the most minimal disruptions — but they were wrong. Download this whitepaper today to discover what they learned.
Fixing Intermittent Application Performance Problems
Intermittent performance problems are among the most frustrating issues IT
administrators face. The apparently random nature of occurrences, the nearimpossibility
of reproducing all conditions, and the complexity of applications
and their dependencies make it difficult to diagnose root causes to resolve an
Considerations for Embracing Wireless Network Management
Employee behavior is once again driving major changes for IT departments – this time it’s BYOD. This report details three critical steps to stay ahead of employee demand for wireless access.
Maximize IT Performance and Availability
10 Versteckte Kosten des BYOD Trends – und die Lösungen
Les 10 Coûts cachés BYOD (Bring your own device / apportez vos propres terminaux)- et leurs correctifs
The Top 10 Hidden Network Costs of BYOD
If you’re over budget this year, your BYOD policy may be to blame. The bottom line: Prior planning prevents poor BYOD performance. As you budget for 2013, consider these 10 unexpected BYOD costs and how to prevent them.
WhatsUp Gold vs. Open Source Network Management
In the network management arena, open source software alternatives provide a compelling argument against big vendors that sell high cost, monolithic systems. However, the central theme to their argument relies on "cost" — open source is 'free' compared to the 'high cost' commercial software. But is it really? In this brief we address the main myths around open source network management, and present WhatsUp Gold's affordable and comprehensive network management capabilities as a strong alternative capable of delivering lower TCO (Total Cost of Ownership) and greater value across the board.
Best Practices: IT Management for Educational Institutions
You're a network engineer at an educational institution, primary or secondary school, community college or university, challenged to support the day-to-day operation across distributed campuses for hundreds or thousands of students, faculty and staff. Are you constantly asked to do more with less? Are you looking for cost-effective ways to manage and secure your infrastructure?
Best Practices: Management & Compliance for Healthcare Industry Sector
To protect and secure electronic protected health information or patient records, you need to know who is accessing which systems and data, and what users are doing at all times. Records of all events taking place in your environment are being logged right now into event logs, W3C logs or Syslog files across your servers, workstations and networking devices. Think about it log files contain complete audit trails of access, additions, deletions or manipulation of key information (i.e. employee records, patient health data, etc.).
Best Practices: IT Management for Manufacturing
IT professionals working in the manufacturing sector must establish a secure, efficient and regulatory compliant IT infrastructure. With disparate plants and locations, a complex underlying infrastructure, mission-critical applications and operational flows spanning across suppliers, distributors, customers and retailers, your role is more challenging than ever before, so it’s mandatory to consolidate and leverage every possible IT resource – including your staff.
Best Practices: IT Management for Healthcare Services
The list of challenges faced by IT professionals in the healthcare sector continues to grow, from security and compliance regulations to cost-cutting initiatives. If you are looking for cost-effective ways to manage your infrastructure and protect access to key information, read on.
Desktop Transformation: Steps for Migration to Virtual Desktop Infrastructure
Virtualization has entered many enterprises at the data center level, targeting server workloads. The promise of higher workload densities per physical server, improved management, enhanced security, platform flexibility and lower operating costs has positioned virtualization as an essential data center tool. Many organizations who have completed their data center transformation are now eyeing their desktops for a similar transformation. Virtual desktop infrastructure (VDI) answers the call with its intrinsic ability to provision, protect and manage the desktop operating system (OS) independent of the underlying hardware.
Secure Management for Government Networks
Securing your network is an ongoing battle for network managers overseeing government and DOD networks. Maintaining the highest possible security requires constant vigilance to ensure data and network integrity.
While you are paying diligent attention to configuring and maintaining access control lists (ACL) and other security mechanisms on routers/switches, IDS/IPS and firewalls, you may forget one aspect of network security policy that is equally as important – SNMP security.
Migrating to IPv6: Fundamentals of IPv6
IPv6 is needed to sustain the growth of the Internet. In theory, we could continue to use IPv4 and work around the address space and security limitations of that protocol, but eventually, the cost of staying with IPv4 will outweigh the benefits. IPv6 eliminates concerns about address exhaustion while improving security. The transition to IPv6 will require planning and likely some degree of support for both protocols during the transition period. As noted by those responsible for managing Internet addresses, it is only a matter of time before IPv4 is no longer viable. Early planning will help ensure the transition is no more difficult than it need be.
Migrating to IPv6: Strategies for Migrating to IPv6
Moving a network from IPv4 to IPv6 usually requires a transition from one standard to another. Trying to make a "big bang" adoption as is sometimes done with enterprise software is not recommended. Instead, running dual stacks to support both IPv4 and IPv6 can provide a fair degree of flexibility at the cost of additional device resources and some additional management overhead. Translating IPv6 to IPv4 protocols may be an option in some cases, such as when NAT is not used, and tunneling is another supported method. No one approach is best for every situation, and your requirements will dictate the appropriate solution for your environment. However, the dual-stack approach can provide a good balance of functionality versus management overhead in many cases.
Migrating to IPv6: Managing IPv6 Challenges and Solutions
The Internet is moving from IPv4 to IPv6. This is a collective decision driven in large part by the exhaustion of IPv4 addresses. To continue to function, grow, and adopt new services, businesses should plan to migrate to IPv6. Fortunately, there are ways to deploy both IPv4 and IPv6 at the same time. Maintaining two logical networks over the same infrastructure creates additional management overhead, but tools are available to address these needs.
Introducing WhatsUp Gold Enterprise Suite
WhatsUp Gold Enterprise Suite gives you all of the enterprise-grade features that you need, proven performance in over 100,000 networks worldwide, and complete deployment ease at a fraction of the cost. Discover, map and manage your entire infrastructure — network devices, server, applications, virtual resources, VoIP, configuration settings and network traffic — from a single interface in a matter of minutes. It's that simple.
The Shortcut Guide to Smart Network Management for the SMB
Small and midsize businesses (SMBs) are facing tough times in today's economy. Because of tighter budgets, many businesses must demand more from the investments they have made in Information Technology. Thus, there is an immediate need for networks to work smarter, not harder. This means that devices and systems on the network must maintain availability and continue performing efficiently at no additional cost to the business and the users. The challenge is daunting – from critical messaging systems to high-density virtual infrastructures, an administrator needs to discover, monitor, and track availability and performance across every device and system. The Shortcut Guide to Smart Network Management for the SMB provides an analysis of these challenges and a clear understanding of how smart network management can meet them.
Solving Network Problems Before They Occur
At best, network problems are a pain in the neck for IT. At worst, they stand in the way of your business' operations, and ultimately its livelihood. The difference between solving them quickly and standing around scratching your head is all about monitoring your network from the inside out. Cohesive management from a single integrated console with access to information from different sources allows you to correlate problem events fast. This is a critical step in ensuring a healthy network.
Deploying and Managing Private Clouds - Steps to Migrating to a Private Cloud
Advances in server hardware, network infrastructure, and virtualization allow for a range of IT architectures, including the use of computing clouds. Clouds are collections of computing, storage, and network services that can be rapidly allocated for particular jobs and then easily released to be employed for other tasks when the jobs are completed. The adoption and continued use of public cloud services demonstrate the effectiveness and efficiency of this computing model. Businesses and other organizations with underutilized server capacity may be well served by redeploying their hardware in a private cloud configuration.
Deploying and Managing Private Clouds - Tips and Best Practices for Managing a Private Cloud
Private clouds are a relatively new model for delivering computing and storage services, but this model builds on a long history of IT infrastructure management. Private clouds are a delivery model that builds on well-established IT practices, such as virtualization, network management, systems administration, and operations management. These practices have developed over years of repeated use and refinement in a wide variety of application areas. We draw from these practices here and highlight three areas that are especially applicable to private cloud management.
Security Management Tactics for the Network Administrator - Using Network Maps and Inventories for Security Compliance
Though most organizations running complex IT infrastructures usually implement highly proficient performance monitoring tools to manage these assets, they often use very basic security tools in the same space. So why not use the data from performance monitoring tools for security? You may well want to after you read this article.
Security Management Tactics for the Network Administrator - Controlling and Managing Security with Performance Tools
Holistic systems to implement, manage, and monitor the system security and configuration must be put in place and then regularly audited with the collection, storage, and analysis of system logs. Records must also be kept and regularly reviewed that track changes to systems to ensure continuous compliance with corporate and industry policy.
While this sounds like a daunting task, it doesn't have to be. Many options exist in today's IT landscape that can meet these needs. In fact, these tools are often already in place to provide performance management and monitoring. They just need to be tapped for a new function. This article shows features of these management tools that can be repurposed to provide additional functionality with no additional overhead or expenditure.
Security Management Tactics for the Network Administrator - Using Network Management Tools to Identify a Network Attack
In this article you'll see that network performance and management data can usually be viewed from a security perspective to analyze, detect, remediate, and provide evidence of security issues.
Network Management in Distributed Environments: Challenges and Opportunities for MSPs
This paper describes the challenges that managed service providers (MSPs) face in the increasingly important area of network management. Operating in a distributed environment, MSPs require an agnostic solution that integrates easily with a variety of network structures. They also have to be able to make sufficient margins on a per-client basis, so MSPs have to balance what they pay for a network management solution with what they can charge for providing network management services.
The Changing Role of the Network Administrator
Traditionally, network administrators have not always gotten the respect they deserve. Over the last few years, however, there has been a growing awareness that the network is central to the success of the organization. As a result, the role – and the status – of network administrators is changing rapidly. This white paper describes how, and identifies a set of attributes network administrators will need to be successful going forward.
The Network Is Your Business
Networks have grown both more complex and more important in recent years. What began as small, departmental networks that supported interoffice email and scheduling have grown into multinational networks spanning companies, countries, and economies. While continuing to support business operations, networks are now being relied on to help drive business objectives as well. This paper describes the importance of network monitoring in enabling networks to achieve this new responsibility.
A Day in the Life of a Network Administrator - The Calm After the Storm
"How did a day of crisis prompt my company to rethink the way we managed our network? Pretty easily. We knew we needed to change, we’d already had our fair share of problems, but it took a real crisis to spur us into action..."
Download the white paper and read the entire story.
A Day in the Life of a Network Administrator - Life After WhatsUp Gold
"Six months ago we brought in WhatsUp Gold to better manage our network after a complex outage on one of our peak business days. Since then, life has been very different. Where chaos and 'after-the fact' troubleshooting once ruled, now notifications and alerts help us to minimize most problems..."
Download the white paper and read the entire story.
A Day in the Life of a Network Administrator - X-Ray Vision with Flow Monitor
"About one month after we installed WhatsUp Gold, we added the Flow Monitor Plug-in Module to provide us with in-depth application monitoring, troubleshooting, and bandwidth utilization capabilities. WhatsUp Gold was working great - instead of spending half our day fire fighting network issues, WhatsUp Gold was proactively alerting us before any real fires occurred. With the addition of Flow Monitor to the mix, we were anxious to see how in-depth traffic level visibility would impact our day-to-day operations. The difference was amazing..."
Download the white paper and read the entire story.