Posted on 15th March 2019 by Mark Towler

Checking Your Network’s Plumbing: Why You Need to Monitor Bandwidth

Everyone and everything in our modern connected world uses bandwidth. The pipes are now far bigger than the old 56kbps dial-up speeds most of the world endured once upon a time, so bandwidth is usually not seen as an issue by the vast majority of network users. Well, not until there’s a problem, that is.…

Posted on 14th March 2019 by Greg Mooney

As The Web Turns 30, The Digital Dark Age is Coming

The World Wide Web’s 30th birthday came and went this week, and though there was much to celebrate—just look how far we’ve gone since the days of America Online CDs and Yahoo! chat rooms— it also seems like the problems the Internet causes are beginning to outweigh the problems it solves. Tim Berners-Lee, who is considered the founder…

Posted on 7th March 2019 by Greg Mooney

Network Bandwidth Usage: How To Optimize Your Network

Company bandwidth usage has, for reasons other than expected growth, increased dramatically and continues to do so every year. Over time this usage is going to increase beyond your workforce’s limitations, which poses an important challenge for IT teams. How do you calculate and optimize the use of the bandwidth you have available to ensure your…

Posted on 26th February 2019 by Jeff Edwards

Podcast: Log Management Basics – What Should You Collect?

Log Management is a hot topic these days, especially in the way it pertains to organizational data security. So in this episode of Defrag This, your host Mark Towler sits down with Jim Cashman to quiz the latter on his sysadmin experience with Log Management. This discussion covers what logs an admin should be collecting,…

Posted on 21st February 2019 by Jeff Edwards

What is Bandwidth Monitoring?

Monitoring bandwidth usage is a vital aspect of any network management strategy. Bandwidth monitors collect, monitor and analyze network traffic volume by end-point (user), port, interface and protocol (application). This information enables IT Admins to: Assure adequate bandwidth for business-critical applications Minimize the impact of non-critical or unauthorized network traffic Identify bandwidth bottlenecks such as…

Posted on 5th February 2019 by Jeff Edwards

How to Strengthen Your SIEM Capabilities by Leveraging Log Management

It’s certainly clear that IT teams that utilize a Security Information and Event Management (SIEM) solution are better positioned to protect the digital assets of their companies. SIEM aggregates vital data from multiple sources and provides alerts that enable IT to detect, prevent, isolate and mitigate security threats. But given today’s cybercriminal environment, where new…

Posted on 28th January 2019 by Michael O'Dwyer

Are Disruptive Technologies Making Bandwidth Monitoring More Important?

As a former cubicle-based drone, I can readily identify with the bandwidth problems faced by users, with slowdowns and interruptions suffered for a variety of reasons, whether it is essential backups best run after-hours, problems with new security patches or updates, failing hardware or streaming video addicts. Unfortunately, when even data centers are debating how…

Posted on 22nd January 2019 by Jeff Pike

Log Management 101: The Key to Protecting Digital Assets

Log data can be a tremendous resource for protecting digital assets against cyber attacks. Trouble is, trying to make sense of all the logs generated by IT networks is like pointing a fire hose at someone dying of thirst. They’re desperate for a drink, but they simply can’t handle that much water all at once!…

Posted on 20th December 2018 by Jeff Edwards

How to Save Money with Cloud Monitoring

From IT to marketing, cloud computing has revolutionized the way the world does business. We now a maintenance-free to get unlimited scalability and reliability, and we’re all going to live happily ever after, right? Well, not exactly. While it’s definitely a huge plus to have massive scalability and storage capacity at our fingertips, without the…

Posted on 19th December 2018 by Jeff Edwards

Four Ways You Can Strengthen Security with Network Monitoring

For most IT organizations, network monitoring is an essential tool. Network monitoring tools play an important role in letting IT pros get complete visibility into the status of network devices, systems, and applications, keeping the IT team aware of problems with services, networks, application performance, and more. But despite Network Monitoring’s reputation as an IT…