Jeff Edwards

Jeff Edwards is a tech writer and analyst with three years of experience covering Information Security and IT. Jeff has written on all things cybersecurity, from APTs to zero-days, and previously worked as a reporter covering Boston City Hall.

Jeff Edwards
How to Get Started with WhatsUp Gold’s New RESTful API

How to Get Started with WhatsUp Gold’s New RESTful API

Last month, we released WhatsUp Gold 2019.1, and with it, the addition of a powerful REST API that lets you easily integrate other systems or your own scripts with WUG. With the new REST API, you can use now use an extensive range of REST API calls to get data from WhatsUp Gold from other […]

How to Use WhatsUp Gold to Set Up Automated ServiceNow Ticketing

How to Use WhatsUp Gold to Set Up Automated ServiceNow Ticketing

Wouldn’t it be great if you could get an automatic alert every time something in your house or car broke, like when a spark plug or fuse failed, or when a light bulb went out? That way you could fix those problems before they caused you any trouble… If only. For most of us, the […]

Security Takes Center Stage in New EMA Report on Network Performance Management (NPM)

Security Takes Center Stage in New EMA Report on Network Performance Management (NPM)

Despite being an essential piece of the Sysadmin toolbox, Network performance management (NPM) can be a bit of a mystery for many IT professionals. Part of the issue is that the NPM toolset is vast, and can be vague—device monitoring, packet and flow analysis, and log analysis are all part of the equation. Another, is […]

Monitoring Your Azure Resource Usage with WhatsUp Gold

Monitoring Your Azure Resource Usage with WhatsUp Gold

In 2019, cloud computing hasn’t just hit the mainstream, it is the mainstream. In fact, some experts are predicting that upwards of 80% of enterprise workloads will live in the cloud by 2020. By-and-large, this rise in cloud adoption has been driven by Amazon Web Services or AWS, as it’s commonly called. And while Amazon […]

Don’t be like Facebook. How Configuration Management Can Prevent Outages and Security Issues

Don’t be like Facebook. How Configuration Management Can Prevent Outages and Security Issues

Improper configuration changes to a network—or even just one server on a network—can cause huge issues. They can degrade network performance, shut down key services, and even result in noncompliance with regulatory standards like SOX, PCI, HIPAA and FISMA. And they can compromise network security. You don’t have to look far to see the disastrous […]

How Device Roles Reduce Administrative Headaches

How Device Roles Reduce Administrative Headaches

Here’s a familiar refrain in IT media: Today’s corporate networks are much different than they were 10, five, or even two years ago. It’s cliched, but it’s true: Modern IT networks are bigger, messier, and more dynamic than they used to be. For system and network administrators, that means it’s now a lot more difficult […]

Podcast: Log Management Basics – What Should You Collect?

Podcast: Log Management Basics – What Should You Collect?

Log Management is a hot topic these days, especially in the way it pertains to organizational data security. So in this episode of Defrag This, your host Mark Towler sits down with Jim Cashman to quiz the latter on his sysadmin experience with Log Management. This discussion covers what logs an admin should be collecting, […]

Four Ways Network Monitoring Can Strengthen Your Security

Four Ways Network Monitoring Can Strengthen Your Security

The following is an excerpt from our Network Monitoring blog at whatsupgold.com/blog.

For most IT organizations, network monitoring is an essential tool. Network monitoring tools play an important role in letting IT pros get complete visibility into the status of network devices, systems, and applications, keeping the IT team aware of problems with services, networks, application performance, and more.

What is Bandwidth Monitoring?

What is Bandwidth Monitoring?

Monitoring bandwidth usage is a vital aspect of any network management strategy. Bandwidth monitors collect, monitor and analyze network traffic volume by end-point (user), port, interface and protocol (application). This information enables IT Admins to: Assure adequate bandwidth for business-critical applications Minimize the impact of non-critical or unauthorized network traffic Identify bandwidth bottlenecks such as […]

How to Strengthen Your SIEM Capabilities by Leveraging Log Management

How to Strengthen Your SIEM Capabilities by Leveraging Log Management

It’s certainly clear that IT teams that utilize a Security Information and Event Management (SIEM) solution are better positioned to protect the digital assets of their companies. SIEM aggregates vital data from multiple sources and provides alerts that enable IT to detect, prevent, isolate and mitigate security threats. But given today’s cybercriminal environment, where new […]