Network Managers Should be Monitoring Servers


Editor’s Note: This article was originally published by HelpSystems on February  2, 2016. Network monitoring is about more than just the network. The network management team needs visibility beyond switches and routers to ensure infrastructure health and performance. Enterprise Management Associates (EMA) research has found that 25% of IT organizations experience server- and storage-related service outages [...]



By | January 26th, 2017|Featured|0 Comments

Early Adopters Define SDN


Greg Ferro recently blogged about how attempts to define software-defined networking (SDN) are a waste of time. He wrote: You can’t define “Software Defined Network” because its not a thing. Its not a single thing or even a few things. Its combination of many things including intangibles. Stop trying to define it. Just deploy it. [emphasis mine] [...]



By | January 26th, 2017|Featured|0 Comments

The Benefits of Leveraging MSPs for Performance and Security Monitoring


[Author’s Note: This post is sponsored by Edgeworx. The content is entirely mine.] One of the benefits of using a managed services provider (MSP) is the ability to add and subtract services as needed. MSPs typically have multiple areas of expertise that an IT organization can lean on. For instance, the organization could start by using the [...]



By | January 26th, 2017|Featured|0 Comments

How to Unleash the Full Value of Hybrid Cloud


In an ideal world, customers would be able to fully take advantage of the benefits of hybrid cloud by rationally matching infrastructure parameters -cost, performance, reliability, availability, security, regulatory compliance, scalability- with the requirements and dependencies of each application. In reality, customers are running into the following 3 challenges: Challenge #1 - Too Much Complexity [...]



By | October 24th, 2016|Featured|0 Comments

Why It’s Never Too Soon to Think about IPv6 Network Management


Most network managers are still many years away from turning on Internet Protocol version 6 (IPv6) in their enterprise local area networks (LANs). Private non-routable IPv4 address ranges can happily exist behind a network address translation (NAT) gateway for the foreseeable future. However, things could change. At any time, someone above your pay grade might [...]



By | September 9th, 2015|Featured, IT Management, Shamus McGillicuddy|0 Comments

Know when it’s time to replace open source and freeware infrastructure management tools


Many small and midsized IT organizations rely on a mix of freeware and open source software to manage their infrastructure. These free tools can be effective and economical choices for smaller networks. But how do you know when it’s time to upgrade to a commercial product? Scale is one of the first indicators that you [...]



By | August 28th, 2015|Featured, IT Management, Shamus McGillicuddy|0 Comments

InterMapper Application for Splunk Answers Need for Log Analytics in Network Management


You may not have noticed, but log analytics has become table stakes for network management toolsets. Last year, Enterprise Management Associates® (EMA™) surveyed network managers about the data sources that have become important to engineering and operations tasks. Log files consistently scored higher than anything else, including flow data, packet analysis, and SNMP metrics. Fifty-nine [...]



By | August 28th, 2015|Featured, IT Management, Shamus McGillicuddy|0 Comments

Docker acquires SocketPlane for multi-host container networking


Docker Inc. acquired networking startup SocketPlane today, indicating that Docker wants to accelerate the development of networking APIs and software that will help network managers operationalize production Linux containers. Docker is a suite of open source software that helps developers and admins manage and scale their use of Linux containers. Containers offer the same resource [...]



IT Point Products DO NOT Support Data Center Infrastructure Management (DCIM), So Stop Calling Them That!


Nothing drives an IT industry analyst more nuts then when a term is repeatedly misused for marketing purposes. DCIM certainly falls into this category. In the recently release EMA Radar Report on Data Center Infrastructure Management, we looked at hundreds of products claiming to be DCIM solutions, but identified only ten (that’s right … 10!) [...]



By | December 12th, 2012|Featured, Steve Brasen|0 Comments

RSA Breach of SecurID Information: Initial Take


(Updated: Commentary on RSA's disclosure and SecurCare advisory of March 17) Yesterday, RSA Security disclosed that it had been the victim of a security breach that, according to Executive Chairman Art Coviello's open letter to customers, resulted in the exposure of information "specifically related to RSA's SecurID two-factor authentication products." Coviello's letter goes on to state that "[w]hile [...]



By | March 18th, 2011|Featured|0 Comments
Load More Posts