Best Practices Series: Network Visualization & Analysis
Understanding exactly what’s happening on your network in real-time through network visualization and analysis can give you the insight to shrink big problems into little, manageable ones.
Understanding exactly what’s happening on your network in real-time through network visualization and analysis can give you the insight to shrink big problems into little, manageable ones.
Network discovery is, not surprisingly, the process of finding and identifying every device, server and system on your network. Mastering IT best practices around network discovery will greatly improve how your map and monitor your IT infrastructure.
Providing fast access to applications and data while protecting digital assets are the two biggest challenges faced by network administrators. Performance and security represent the two-pronged mission that administrators find themselves facing every day.
Wouldn't it be great if you could get an automatic alert every time something in your house or car broke, like when a spark plug or fuse failed, or when a light bulb went out? That way you could fix those problems before they caused you any trouble... If only. For most of us, the prospect of such a smart home is still a distant glimmer in the future, but for IT teams (and others) working in a modern enterprise, you can get automatic notifications when parts of your infrastructure fail, and you can fix those failures before they cause problems. How? With the IT swiss army knife/ticketing system known as ServiceNow.
Many organizations that rely on Amazon Web Services (AWS) aren't doing the best job tracking their AWS resource usage and spending– they just pay the monthly bill from Amazon. Unless that bill significantly increases, they have no incentive to determine if they’re really using all those resources or if they’re being accurately billed. But they should be— many companies pay an average of 36% more for cloud services than they need to, according to one report.
Steel is a commodity so Klein Steel knows they need to be unique to stand out in a crowded market. So they created Klein Steel Service’s Advanced Center of Excellence facility to accomplish just that.
Your IT infrastructure is ready to make the big move—from on-premises to the public cloud. Or perhaps you’re already in the cloud, but it’s time for a change to a new platform provider.
When troubleshooting problems or investigating potential security breaches, the Windows event log is a great place to start. Windows provides an extensive list of various event logs grouped by a provider with a sometimes staggering number of events recorded within. With all of these events being recorded, it's hard to figure out what's going on. One way to search event logs across not one but hundreds of servers at once is with PowerShell.
Last month, we released WhatsUp Gold 2019.1, and with it, the addition of a powerful REST API that lets you easily integrate other systems or your own scripts with WUG.
With the new REST API, you can now use an extensive range of REST API calls to get data from WhatsUp Gold from other systems, or input data to WhatsUp Gold or have other systems make changes. The result is a huge range of automation use cases that will help IT teams be faster and more efficient. Example use cases include the ability to automatically put devices in maintenance mode before making changes, the ability to add or remove devices and monitors automatically, and more.Amazon Web Services (AWS) have simply become a fact of life for most IT organizations. The benefits of outsourcing networking to Amazon’s cloud are simply too obvious to ignore or to not take advantage of.
Despite being an essential piece of the Sysadmin toolbox, Network performance management (NPM) can be a bit of a mystery for many IT professionals.
WhatsUp Gold can monitor every single part of your network to give you a wealth of information on status, performance, traffic and thousands of other metrics. And now WhatsUp Gold can share that information directly with any of your systems thanks to our new REST API.
It’s 2:00 a.m. in the United States: Can your employees and customers in Europe and Asia access the applications running in your Microsoft Azure cloud? If you’re not sure on a 24x7 basis what the status is of your Azure servers and applications, it’s time to invest in a third-party monitoring tool.
If you are reading this, you are likely interested in or already utilize cloud solutions. Both Azure and AWS (Amazon Web Services) offer a variety of infrastructure as a service (IaaS), platform as a service (PaaS) and software as a service (SaaS) offerings. Selection between the two, with AWS the dominant market leader, is typically based on business requirements and online research or direct referrals (some of your contacts recommend a solution based on pricing, uptime or other). I could rehash vendor websites, favorable reviews, and other somewhat biased materials to prove the headline but, as always, I prefer to go my own route, bringing my own biases to the fore.
One of the more disheartening aspects of log collection within the Windows Operating system are the limited number of out of the box events related to security. It is often desirable to capture any unknown or malicious running processes, capture the source process for outbound connections, identify modifications to files and the registry, and to capture command and PowerShell commands that are run on a particular endpoint. Luckily for systems administrators, Microsoft provides a great tool for this type of log capture within the SysInternals suite called system monitor, or Sysmon.
In 2019, cloud computing hasn’t just hit the mainstream, it is the mainstream. In fact, some experts are predicting that upwards of 80% of enterprise workloads will live in the cloud by 2020.
DevOps as a practice and philosophy includes the communication and teamwork between developers and IT operations. Traditionally, developers and operations are two very different teams who would point fingers when issues would arise with software. DevOps is an attempt to abolish this and has both teams work together. The business result of this is a more stable and reliable software to provide to customers.
Over the past week, news broke about a rogue device that had gone unnoticed on NASA’s Jet Propulsion Lab (JPL) IT network. The fact that a Raspberry Pi went unnoticed for almost 10 months is a clear signal of network management issues and lackluster security policies in place within NASA, and other government agencies for that matter.
Working in a DevOps environment, agility is everything. That next release needs to get into production quickly, so even a minor network issue can hamper speed and efficiency.
Windows event logs are a tool that every cybersecurity and IT professional should have in his or her arsenal. They can be used locally for troubleshooting or centralized for network awareness. When utilized centrally, powerful software known as a Security Information Event Management (SIEM) can be utilized to parse and search log files. But what if you are working locally? Is there an efficient method to do the same? You will find the answer to these questions lies in Microsoft’s most powerful tool belt, Microsoft PowerShell.
Get our latest blog posts delivered in a monthly email.