skip navigation WhatsUp Gold - a Progress Software Company
  • Software
    Whatsup Gold
    • Overview
    • What's New
    • WhatsUp Gold 360
    • FAQs
    • Pricing
    • System Reqs
    • Upgrade
    • Free Tools
    • Trial
    Features & Capabilities
    • Application Monitoring
    • Automated Discovery
    • Bandwidth Monitoring
    • Cloud Monitoring
    • Configuration Management
    • Distributed Monitoring
    • Hardware Monitoring
    • IT Infrastructure Monitoring
    • Log Management
    • Network Mapping
    • Reporting
    • REST API
    • Server Monitoring
    • Traffic Monitoring
    • Virtualization Management
    • Wireless Monitoring
  • Solutions
    IT Solutions
    • AWS Monitoring
    • Azure Monitoring
    • SQL Server Monitoring
    • DevOps Monitoring
    • Dark Web Monitoring
    Industries
    • Education
    • Federal Government
    • State and Local Government
  • Resources & Support
    Resources
    • Video Demo
    • Best Practices
    • Blog
    • ABCs of ITIM
    • Case Studies
    • Customer Reviews
    • Data Sheets
    • Videos
    • Webinars
    • Events
    • FAQs
    • eBooks
    Support
    • Community
    • Documentation
    • Support
    • Training
    • Validation Program
    • Trust Center
  • How To Buy
    • Pricing
    • Get a Price Quote
    • Professional Services
    • Upgrade
  • Partners
    • Find a Partner
    • Become a Partner
    • Partner Login
    • Deal Registration
    • Deutsch
    • Español
    • Italian
    • Français
    • Português
    • 日本語
    • 繁體中文
  • Ready to talk?
  • Free Trial
    • Deutsch
    • Español
    • Italian
    • Français
    • Português
    • 日本語
    • 繁體中文
  • Monitoring AWS Resource Usage: Are You Just Taking Amazon’s Word For It?

    Aug 29, 2019, 00:00 AM by Mark Towler

    Amazon Web Services (AWS) have simply become a fact of life for most IT organizations. The benefits of outsourcing networking to Amazon’s cloud are simply too obvious to ignore or to not take advantage of.

    Full story
  • The Real Reason We Need Multiple Data Backups

    Aug 21, 2019, 00:00 AM by Michael O'Dwyer

    In many jurisdictions, there is a legislative or accounting requirement to store data for a minimum of five years. Easier said than done. That's why multiple data backups are necessary.

    Full story
  • Security Takes Center Stage in New EMA Report on Network Performance Management (NPM)

    Aug 14, 2019, 00:00 AM by Jeff Edwards
    Despite being an essential piece of the Sysadmin toolbox, Network performance management (NPM) can be a bit of a mystery for many IT professionals.
    Full story
  • What is a Port Scanner?

    Aug 6, 2019, 13:00 PM by Greg Mooney

    Scanning ports is very popular among cybercriminals. It’s often their first step of reconnaissance to discover services they can exploit and systems they can break into as they try to steal or destroy sensitive data. Two recent examples of major breaches illustrate just how handy port scanning is to threat actors:

    Full story
  • Now You Can Integrate WhatsUp Gold with Anything

    Jul 31, 2019, 00:00 AM by Mark Towler
    WhatsUp Gold can monitor every single part of your network to give you a wealth of information on status, performance, traffic and thousands of other metrics. And now WhatsUp Gold can share that information directly with any of your systems thanks to our new REST API.
    Full story
  • WhatsUp Gold vs. Azure Application Insights

    Jul 30, 2019, 13:00 PM by Michael O'Dwyer
    Disclaimer: Azure Monitor’s is more than 2700 pages of fascinating material. Azure Application Insights is a small part of it. Given the variety of nodes, features, apps and development methods in an Azure infrastructure, app and performance monitoring objectives can be achieved in many ways. This article focuses on Application Insights only.
    Full story
  • Why Azure Up/Down Monitoring Is So Important

    Jul 29, 2019, 13:00 PM by Greg Mooney

    It’s 2:00 a.m. in the United States: Can your employees and customers in Europe and Asia access the applications running in your Microsoft Azure cloud? If you’re not sure on a 24x7 basis what the status is of your Azure servers and applications, it’s time to invest in a third-party monitoring tool.

    Full story
  • Why Azure is Better Than AWS

    Jul 26, 2019, 00:00 AM by Michael O'Dwyer

    If you are reading this, you are likely interested in or already utilize cloud solutions. Both Azure and AWS (Amazon Web Services) offer a variety of infrastructure as a service (IaaS), platform as a service (PaaS) and software as a service (SaaS) offerings. Selection between the two, with AWS the dominant market leader, is typically based on business requirements and online research or direct referrals (some of your contacts recommend a solution based on pricing, uptime or other). I could rehash vendor websites, favorable reviews, and other somewhat biased materials to prove the headline but, as always, I prefer to go my own route, bringing my own biases to the fore.

    Full story
  • How to Tune Windows System Monitor (Sysmon)

    Jul 19, 2019, 00:00 AM by Dan Fransiscus

    One of the more disheartening aspects of log collection within the Windows Operating system are the limited number of out of the box events related to security. It is often desirable to capture any unknown or malicious running processes, capture the source process for outbound connections, identify modifications to files and the registry, and to capture command and PowerShell commands that are run on a particular endpoint.  Luckily for systems administrators, Microsoft provides a great tool for this type of log capture within the SysInternals suite called system monitor, or Sysmon.

    Full story
  • Monitoring Your Azure Resource Usage with WhatsUp Gold

    Jul 18, 2019, 13:00 PM by Jeff Edwards

    In 2019, cloud computing hasn’t just hit the mainstream, it is the mainstream. In fact, some experts are predicting that upwards of 80% of enterprise workloads will live in the cloud by 2020.

    Full story
  • The Importance of Continuous Delivery in DevOps

    Jul 8, 2019, 00:00 AM by Dan Fransiscus

    DevOps as a practice and philosophy includes the communication and teamwork between developers and IT operations. Traditionally, developers and operations are two very different teams who would point fingers when issues would arise with software. DevOps is an attempt to abolish this and has both teams work together. The business result of this is a more stable and reliable software to provide to customers.

    Full story
  • Raspberry Pi Used to Steal 500MB of Data From NASA

    Jun 28, 2019, 00:00 AM by Greg Mooney

    Over the past week, news broke about a rogue device that had gone unnoticed on NASA’s Jet Propulsion Lab (JPL) IT network. The fact that a Raspberry Pi went unnoticed for almost 10 months is a clear signal of network management issues and lackluster security policies in place within NASA, and other government agencies for that matter.

    Full story
  • 3 Network Monitoring Functionalities That DevOps Teams Need

    Jun 17, 2019, 00:00 AM by Greg Mooney
    Working in a DevOps environment, agility is everything. That next release needs to get into production quickly, so even a minor network issue can hamper speed and efficiency.
    Full story
  • How To Cure Your Imposter Syndrome

    May 31, 2019, 00:00 AM by Adam Bertram

    As a previous sufferer of imposter syndrome, I understand what it's like to feel like you're living someone else's remarkable life doing what someone else should be doing; but not me.

    Full story
  • Using PowerShell to Search and Troubleshoot Windows Event Logs

    May 27, 2019, 00:00 AM by Dan Fransiscus

    Windows event logs are a tool that every cybersecurity and IT professional should have in his or her arsenal. They can be used locally for troubleshooting or centralized for network awareness. When utilized centrally, powerful software known as a Security Information Event Management (SIEM) can be utilized to parse and search log files. But what if you are working locally?  Is there an efficient method to do the same? You will find the answer to these questions lies in Microsoft’s most powerful tool belt, Microsoft PowerShell.

    Full story
  • Oh No, Not Asset Inventory Time Again!

    May 21, 2019, 00:00 AM by Mark Towler

    If you’ve ever said that or even thought it, then you know exactly how much fun taking inventory is. Or is not, rather. Every industry requires periodic asset inventory – that’s just a fact of life.

    Full story
  • The Future of Network Monitoring

    May 20, 2019, 00:00 AM by Greg Mooney

    It’s been predicted for years that most computers will run in the cloud and your screen will be the only connection between you and the cloud. Does that mean the business infrastructures will matter anymore, and what does that mean for the future of network monitoring?

    Full story
  • Don't be like Facebook. How Configuration Management Can Prevent Outages and Security Issues

    May 8, 2019, 00:00 AM by Jeff Edwards

    Improper configuration changes to a network—or even just one server on a network—can cause huge issues. They can degrade network performance, shut down key services, and even result in noncompliance with regulatory standards like SOX, PCI, HIPAA and FISMA. And they can compromise network security.

    Full story
  • 5G is Coming – What Does It Mean For Your Business?

    May 3, 2019, 00:00 AM by Michael O'Dwyer
    Often perceived as a precursor to Industry 4.0, the rollout of 5G, if the marketing is to be believed, will allow innovations that were previously restricted or unreliable due to lack of bandwidth. Speeds of up to 10Gbps are promised by telecom companies but since we have yet to experience real-life usage scenarios, this is mere speculation.
    Full story
  • Port Scanning 101: What It Is, What It Does, Why Hackers Love It, and Why You Will Too

    Apr 10, 2019, 00:00 AM by WhatsUp Gold Team
    According to the SANS Institute, Port Scanning is one of the most popular techniques attackers use to discover services that they can exploit to break into systems. In this article, we will discuss some best practices you can employ to defend against attackers and prevent potential network breaches.
    Full story
1 2 3 4 5 6 7 8 9 10
Next
WhatsUp Gold
  • Pricing
  • What's New
  • Get a Price Quote
  • Customer Reviews
  • Video Demo
  • Find a Reseller
  • Contact
Support
  • Support and Learning Center
  • Community
  • Documentation
  • Product Forum
  • Product Lifecycle
  • Manage Software Licenses
  • Renewals
  • Technical Services
  • Training
Products
  • Secure File Transfer
  • Mission-Critical App Platform
  • Digital Decisioning
  • Secure Data Connectivity and Integration
  • UX/UI Tools
  • Digital Experience
Company
  • About Us
  • Awards
  • Press Releases
  • Media Coverage
  • Events
  • Corporate Blog
  • Careers
  • Offices

Copyright © 2025 Progress Software Corporation and/or its subsidiaries or affiliates. All Rights Reserved.

Progress and certain product names used herein are trademarks or registered trademarks of Progress Software Corporation and/or one of its subsidiaries or affiliates in the U.S. and/or other countries. See Trademarks for appropriate markings.

Privacy Center Trust Center License Agreement
Do Not Sell or Share My Personal Information

Powered by Progress Sitefinity

English - BlogDeutsch - BlogEspañol - BlogFrançais - BlogPortuguês - Blog日本語 - ブログ繁體中文 - 部落格English - Casa