Footprinting your environment is the first step to identifying ways in which intruders can penetrate your network. Thankfully, we offer a free utility that helps with precisely this task! In this Snip, Anthony Howell shows you how to use WhatsUp PortScanner to scan a host machine for open ports, then he'll show you how to harden your system using the host's firewall.
It's the last Friday in July which means it's the annual System Administrator Appreciation Day, also known as Sysadmin Day. It's kind of the Hallmark holiday of the IT world, but that doesn't mean it doesn't have any significance.
Human error is responsible for more than half of all security breaches as of last year, making employees the biggest cyber threat of all. Shadow IT, on the other hand, is the deliberate installation of software that is not authorized by IT. The reasons for it? They vary, but generally include tools to make your tickets easier — which should already be available in a centralized company repository.
"The story of the blind men and an elephant originated in the Indian subcontinent from where it has widely diffused. It is a story of a group of blind men (or men in the dark) who touch an elephant to learn what it is like. Each one feels a different part, but only one part, such as the side or the tusk. They then compare notes and learn that they are in complete disagreement." (Source: Wikipedia)
After several years of steady cloud adoption in the enterprise, an interesting trend has emerged. More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from $25 billion in 2014 to a whopping $84 billion by 2019.
When you evaluate application performance monitoring solutions, comparing capabilities is one key part of the assessment. But it can be misleading. Many application performance monitoring solutions include features that, while interesting, are not critical to you. Sometimes the feature-rich solutions are more costly, complex, and difficult to implement than you want. But sometimes more affordable products include features that aren’t high priority to you. The cost isn’t itself the determinant of whether products have more features than you need; it’s more a question of how closely each solution fits your purpose.
Auditing network inventory can be time-consuming and tedious. It’s only amplified for organizations with an IT environment that spans across multiple locations. Making matters worse, manual inventories lead to outdated information and issues with compliance audits. But don't just take our word for it.
Imagine fielding a barrage of support calls from upset college students. Up in arms as they can't access a wireless network. Not long ago, that was the reality for a large university. The help desk was overwhelmed as they tried to manage a network of 2,500 access points. On top of BYOD chaos and students' big appetites for downloads.
The final months of the year are often a time for housecleaning in IT which includes tasks like taking network inventory, confirming installed software is properly licensed, and prepping for compliance audits. Fortunately, these tasks are something a network monitoring solution can easily handle by gathering data and creating reports. Even better, you don't necessarily have to pay to get these tasks done.
Everyone and everything in our modern connected world uses bandwidth. The pipes are now far bigger than the old 56kbps dial-up speeds most of the world endured once upon a time, so bandwidth is usually not seen as an issue by the vast majority of network users. Well, not until there’s a problem, that is.
Windows event logs are a tool that every cybersecurity and IT professional should have in his or her arsenal. They can be used locally for troubleshooting or centralized for network awareness. When utilized centrally, powerful software known as a Security Information Event Management (SIEM) can be utilized to parse and search log files. But what if you are working locally? Is there an efficient method to do the same? You will find the answer to these questions lies in Microsoft’s most powerful tool belt, Microsoft PowerShell.
In July this year, a computer fault forced United Airlines to ground its flights in the US for the second time in a matter of weeks. The problem, it turned out, was a ‘network connectivity’ issue caused by a computer router malfunction.
Scanning ports is very popular among cybercriminals. It’s often their first step of reconnaissance to discover services they can exploit and systems they can break into as they try to steal or destroy sensitive data. Two recent examples of major breaches illustrate just how handy port scanning is to threat actors:
If you’re a Network Administrator in a small to medium-sized business, chances are you’ve heard about our monitoring solution, WhatsUp Gold. You may even have fond memories of using it years ago. If you've never heard of WhatsUp Gold, then even more reason to check out the newest version, WhatsUp Gold 2018, which is packed with new features and capabilities.
You have the right to request deletion of your Personal Information at any time.
You can also ask us not to pass your Personal Information to third parties here: Do Not Sell My Info
We see that you have already chosen to receive marketing materials from us. If you wish to change this at any time you may do so by clicking here.
Thank you for your continued interest in Progress. Based on either your previous activity on our websites or our ongoing relationship, we will keep you updated on our products, solutions, services, company news and events. If you decide that you want to be removed from our mailing lists at any time, you can change your contact preferences by clicking here.