Four Types of Log Data to Manage and Monitor
There are so many types of log data to monitor and manage, but what are the most important logs to track? These are the top four types of log data that every IT team should be holding on to just in case.
What's Up, What's Down and What's Trending
There are so many types of log data to monitor and manage, but what are the most important logs to track? These are the top four types of log data that every IT team should be holding on to just in case.
Log data can be a tremendous resource for protecting digital assets against cyber attacks. Trouble is, trying to make sense of all the logs generated by IT networks is like pointing a fire hose at someone dying of thirst. They’re desperate for a drink, but they simply can’t handle that much water all at once!
Users are part of any network and while sometimes troublesome, it’s the responsibility of the IT admin team to ensure that users can access only the resources necessary to perform their roles. The receptionist has no need to access software project data and software developers have no interest in HR resources. Therefore, user permissions are necessary.
From IT to marketing, cloud computing has revolutionized the way the world does business. We now a maintenance-free to get unlimited scalability and reliability, and we’re all going to live happily ever after, right?
If 2017 was the year of the ransomware attack, then 2018, insofar as it can be defined by malware, was the year of cryptojacking.
For most IT organizations, network monitoring is an essential tool. Network monitoring tools play an important role in letting IT pros get complete visibility into the status of network devices, systems, and applications, keeping the IT team aware of problems with services, networks, application performance, and more.
Starting January 1, 2019 AlertFox and associated services will no longer function as we sunset this Ipswitch product.
Outages of Amazon Web Services’ Simple Storage Service (S3) happen from time to time, which is exactly why you need a business recovery strategy.
Network issues don’t care if you’re out of the office or away from your desk – they happen when they happen. But now you can put the power of WhatsUp Gold in your pocket and start resolving issues anytime and anywhere with the new WhatsUp Gold App.
For most IT organizations, the network monitoring tool is an essential, even central part of the IT toolkit. Network monitoring tools play an important role in letting IT pros know where issues exist before helpdesk tickets start coming in, keeping the IT team aware of problems with service, networks, application performance, and more.
If all or part of your infrastructure is in the cloud, you need to monitor it. This article describes the what and how of cloud monitoring.
For home users, monitoring bandwidth usage per device may seem like a pointless exercise but their business counterparts typically recognize the value of doing so.
In a complex network environment, traditional methods for application monitoring can be cumbersome, complicated, or even inefficient.
In this snip, we'll go over how to set up an AWS EC2 instance in WhatsUp Gold 2018. Once we've got our host set up, we'll then create a simple monitor to be notified when the EC2 instance is stopped.
For years, there have been concerns of the Chinese government building backdoors and spying capabilities in to phones and hardware built on their soil, and now it seems those concerns are coming to head with a recent Bloomberg story that alleges that Chinese government agents installed thousands of spy chips into servers used by Amazon, Apple, and the US government. How true are these allegations, are our servers safe? In this article, we’ll attempt to figure out what—if anything—happened, and how IT pros should react.
Footprinting your environment is the first step to identifying ways in which intruders can penetrate your network. Thankfully, we offer a free utility that helps with precisely this task! In this Snip, Anthony Howell shows you how to use WhatsUp PortScanner to scan a host machine for open ports, then he'll show you how to harden your system using the host's firewall.
With the latest release of WhatsUp Gold, we've addedcloud performance monitoring and the ability to track virtual resource usage, so that you always know how much you're spending on cloud services such as Azure and AWS. In this video from Ipswitch contributor Adam Bertram, we'll cover how to use WhatsUp Gold 2018 to monitor Azure VMs.
A new feature in Ipswitch's WhatsUp Gold network monitoring product is the ability to monitor Azure Virtual Machines. In this video from Ipswitch contributor Adam Betram, we'll cover how to add an Azure credential to WhatsUp Gold and how to set up an initial discovery to discover all Azure Virtual Machines in a subscription.
Choosing the right network configuration manager—and implementing it correctly—is absolutely critical.
Monitoring traffic on the dark web is the kind of thing that IT administrators worry about, but they can't do anything about. Now IT can pinpoint who and what is accessing the dark web from corporate networks with WhatsUp Gold.
Get our latest blog posts delivered in a monthly email.