Imagine fielding a barrage of support calls from upset college students. Up in arms as they can't access a wireless network. Not long ago, that was the reality for a large university. The help desk was overwhelmed as they tried to manage a network of 2,500 access points. On top of BYOD chaos and students' big appetites for downloads.
The final months of the year are often a time for housecleaning in IT which includes tasks like taking network inventory, confirming installed software is properly licensed, and prepping for compliance audits. Fortunately, these tasks are something a network monitoring solution can easily handle by gathering data and creating reports. Even better, you don't necessarily have to pay to get these tasks done.
Everyone and everything in our modern connected world uses bandwidth. The pipes are now far bigger than the old 56kbps dial-up speeds most of the world endured once upon a time, so bandwidth is usually not seen as an issue by the vast majority of network users. Well, not until there’s a problem, that is.
Windows event logs are a tool that every cybersecurity and IT professional should have in his or her arsenal. They can be used locally for troubleshooting or centralized for network awareness. When utilized centrally, powerful software known as a Security Information Event Management (SIEM) can be utilized to parse and search log files. But what if you are working locally? Is there an efficient method to do the same? You will find the answer to these questions lies in Microsoft’s most powerful tool belt, Microsoft PowerShell.
In July this year, a computer fault forced United Airlines to ground its flights in the US for the second time in a matter of weeks. The problem, it turned out, was a ‘network connectivity’ issue caused by a computer router malfunction.
Scanning ports is very popular among cybercriminals. It’s often their first step of reconnaissance to discover services they can exploit and systems they can break into as they try to steal or destroy sensitive data. Two recent examples of major breaches illustrate just how handy port scanning is to threat actors:
If you’re a Network Administrator in a small to medium-sized business, chances are you’ve heard about our monitoring solution, WhatsUp Gold. You may even have fond memories of using it years ago. If you've never heard of WhatsUp Gold, then even more reason to check out the newest version, WhatsUp Gold 2018, which is packed with new features and capabilities.
Spotify recommends the next album you should play. Twitter customizes moments and stories you should be reading. The flash sale site Gilt personalizes online shopping down to your favorite brands and discounts. The best experiences on the Web and mobile apps involve clean design, interesting details and intuitive interactions. When companies strive to offer this experience in their apps, they often turn to the LAMP stack for enablement.
Goodbye spreadsheets, hello WhatsUp IP Address Manager! With WhatsUp IP Address Manager you can stop using spreadsheets by automating the discovery and ongoing management of your IP space. This easy to use, cost effective, enterprise-ready IPAM solution enables you to manage, optimize and protect your entire IP space.
Hey folks, this is Brian M. Jacobs, Senior Product Manager for the WhatsUp Gold family of network management products. I would like to let you know that a security researcher (who has been a big fan of WhatsUp Gold for many years) has informed us of a SQL injection vulnerability in the WhatsUp Gold v15.0.2 product. This vulnerability involves WhatsUp Gold running in a default deployment, in which administrators have privileged access to the database instance. For customers who wish to restrict access to their database, we already provide the capability to configure WhatsUp Gold to run with reduced database privileges. Details on how to implement reduced privilege operation can be found in our Database Migration and Management Guide. Based on our customers' input, we are also working on security patches to limit all SQL injection related vulnerabilities, regardless of database privilege level.
With the advent of BYOD, it seems like just yesterday that a new mobile movement was making waves through enterprise organizations across the globe. BYOD offers new opportunities for increased productivity, but it also raises a slew of difficult security questions. While many IT pros are still wading through the repercussions of this mobile onslaught, a fresh, new user revolution is creating similar buzz (and similar problems).
Last month we polled more than 1300 IT pros from around the world about their challenges with IT complexity. What we heard loud and clear is that there is far too much to get done, but not enough time to do it. Not to mention the time IT spends chasing down problems without full network visibility to find them fast enough.
Last month, we released WhatsUp Gold 2019.1, and with it, the addition of a powerful REST API that lets you easily integrate other systems or your own scripts with WUG.
With the new REST API, you can now use an extensive range of REST API calls to get data from WhatsUp Gold from other systems, or input data to WhatsUp Gold or have other systems make changes. The result is a huge range of automation use cases that will help IT teams be faster and more efficient. Example use cases include the ability to automatically put devices in maintenance mode before making changes, the ability to add or remove devices and monitors automatically, and more.
For most IT organizations, the network monitoring tool is an essential, even central part of the IT toolkit. Network monitoring tools play an important role in letting IT pros know where issues exist before helpdesk tickets start coming in, keeping the IT team aware of problems with service, networks, application performance, and more.
“If there’s one thing I hate the most, it’s software licensing.” This was said to me, unprompted, by my friend Janine who works in government. She managed operations at large federal organization and handled budget items in the billions of dollars each year. But her biggest hassle was dealing with how her vendors handled software licensing.
You have the right to request deletion of your Personal Information at any time.
You can also ask us not to pass your Personal Information to third parties here: Do Not Sell My Info
We see that you have already chosen to receive marketing materials from us. If you wish to change this at any time you may do so by clicking here.
Thank you for your continued interest in Progress. Based on either your previous activity on our websites or our ongoing relationship, we will keep you updated on our products, solutions, services, company news and events. If you decide that you want to be removed from our mailing lists at any time, you can change your contact preferences by clicking here.