What Is Cloud Monitoring? Why Do You Need It? cloud monitoring

What Is Cloud Monitoring? Why Do You Need It?

If all or part of your infrastructure is in the cloud, you need to monitor it. This article describes the what and how of cloud monitoring. Pretty much every business is using the cloud in some form these days. In fact, 93 percent of businesses say they use cloud services, and many anticipate investing in it more. […]

How To Use Network Monitoring As An Early Warning System For Security Issues

How To Use Network Monitoring As An Early Warning System For Security Issues

For most IT organizations, the network monitoring tool is an essential, even central part of the IT toolkit. Network monitoring tools play an important role in letting IT pros know where issues exist before helpdesk tickets start coming in, keeping the IT team aware of problems with service, networks, application performance, and more. But despite its reputation […]

Podcast: New Enhancements in WhatsUp Gold 2018 Service Pack 3

Podcast: New Enhancements in WhatsUp Gold 2018 Service Pack 3

Ipswitch has continued to roll out enhancements of WhatsUp Gold 2018 with the release of the third WhatsUp Gold update of the year. WhatsUp Gold (WUG) 2018 Service Pack 3, which was generally available on October 28th, 2018, includes several key visibility and usability enhancements for WUG 2018, including a new Application performance monitoring (APM) […]

What is Cisco Discovery Protocol (CDP)?

What is Cisco Discovery Protocol (CDP)?

Keeping an up-to-date network inventory is essential for network efficiency, especially given current networks changing dynamics. The Cisco Discovery Protocol (CDP) is a network discovery tool, which assists network administrators and engineers in identifying neighboring Cisco devices, particularly those running lower-layer, transparent protocols. CDP is a Layer 2 proprietary protocol that is default-enabled on all […]

How to Easily Monitor Bandwidth Usage Per Device

How to Easily Monitor Bandwidth Usage Per Device

For home users, monitoring bandwidth usage per device may seem like a pointless exercise but their business counterparts typically recognize the value of doing so. Bandwidth is not a limitless resource and total broadband bandwidth (as provided by your internet service provider or ISP) is shared between all the devices connected to the network. If […]

Video: How To Scan For—And Lock Down—Open Ports With WhatsUp PortScanner port scanner video

Video: How To Scan For—And Lock Down—Open Ports With WhatsUp PortScanner

Foot-printing your environment is the first step to identifying ways in which intruders can penetrate your network. Thankfully, we offer a free utility that helps with precisely this task! In this Snip, Anthony Howell shows you how to use Ipswitch’s WhatsUp PortScanner to scan a host machine for open ports, then he’ll show you how to harden your system […]

Managing User Permissions in Active Directory is the Logical Choice active directory

Managing User Permissions in Active Directory is the Logical Choice

Users are part of any network and while sometimes troublesome, it’s the responsibility of the IT admin team to ensure that users can access only the resources necessary to perform their roles. The receptionist has no need to access software project data and software developers have no interest in HR resources. Therefore, user permissions are […]

Did China Pull off the Biggest Hardware Hack in History?

Did China Pull off the Biggest Hardware Hack in History?

For years, there have been concerns of the Chinese government building backdoors and spying capabilities in to phones and hardware built on their soil, and now it seems those concerns are coming to head with a recent Bloomberg story that alleges that Chinese government agents installed thousands of spy chips into servers used by Amazon, Apple, and the US government. How true are these allegations, are our servers safe? In this article, we’ll attempt to figure out what—if anything—happened, and how IT pros should react.