Network Monitoring - Infoworld en NSA hacked into servers at Huawei headquarters, reports say <p>The U.S. National Security Agency has hacked into Huawei Technologies servers, spied on communications of company executives, and collected information to plant so-called backdoors on equipment from the Chinese networking manufacturer, according to reports published over the weekend.</p> Networking Security Network Monitoring Government Networking Security Mon, 24 Mar 2014 12:00:23 +0000 admin 238933 at Review: PathSolutions solves the network monitoring maze <div style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 200px; height: 150px;"><img src="" alt="PathSolutions TotalView v4.3" width="200" height="150" align="right" /></div> <p>Network monitoring has traditionally been device-centric, with a concentration on the health of the individual devices that make up your network. This is not a bad thing. After all, monitoring the health of network devices is critically important.</p> Networking Network Analyzer Network Monitoring Networking IDG Insider Thu, 20 Feb 2014 11:00:00 +0000 Doug Dineley 236371 at Where PCI compliance fails: Security testing, network monitoring <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 192px;"><img src="" alt="Where PCI compliance fails: Security testing, network monitoring" width="243" height="182" align="right" /><br /><em><p align="right">Credit: shuchun ke</p></em></div> Networking Security Compliance Network Monitoring Intrusion Detection Network Security Security Standards Vulnerability Assessment Fri, 07 Feb 2014 19:57:46 +0000 InfoWorld Tech Watch 235948 at 5 must-have capabilities for every monitoring system <p>Of all of the measures we deploy in our infrastructures to keep them up and running, monitoring systems are one of the most critical, yet one of the most overlooked. Building a solid monitoring system to warn you of impending doom, help you quickly size up a disaster in progress, or aid in swiftly bringing <a href="">complex performance troubleshooting to a close</a> can be a hugely valuable endeavor no matter what scale operation you run.</p> Data Center Data Explosion Networking Storage Network Monitoring Data Center Storage IDG Insider Tue, 26 Nov 2013 11:00:00 +0000 Matt Prigge 231597 at SNMP: No one likes it, yet no one cares to replace it <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 182px;"><img src="" alt="SNMP: No one likes it, yet no one cares to replace it" width="243" height="182" align="right" /></div><p>I wager that an informal poll of IT admins across all disciplines would show that most do not bother with SNMP (Simple Network Management Protocol), and those who use SNMP do so in conjunction with basic read-only monitoring fra</p> Data Center Networking Network Management Network Monitoring Data Center Networking Mon, 25 Nov 2013 11:00:00 +0000 Paul Venezia 231482 at Tracking services monitor your every move <p>Last month, <a href="">CSO presented findings from Skyhigh Networks</a>, which outlined the types of risky applications that exist on a given network. The study noted that many popular applications were monitored and controlled, but lesser-known applications were given free-reign for the most part.</p> Networking Security Network Monitoring Internet Privacy Network Security Wed, 09 Oct 2013 11:31:01 +0000 admin 228415 at Internet traffic jams, meet your robot nemesis <p>On an 80-core computer at the Massachusetts Institute of Technology, scientists have built a tool that might make networks significantly faster just by coming up with better algorithms.</p> Networking Internet Network Monitoring Mon, 22 Jul 2013 11:57:54 +0000 admin 223131 at Cisco edges F5 in VPN shoot-out <p>Connecting remotely to network servers is a fact of life for millions of end-users. Whether working from a PC or a mobile device, users rely on secure, reliable remote connections to maintain their productivity.</p> <p>We tested five products that deliver remote SSL/VPN connectivity: WatchGuard SSL 560, Barracuda SSL VPN 380, Dell SonicWall EX-7000, F5 Networks BIG-IP Edge Gateway 3900 Platform and <a href="" target="_blank">Cisco</a>'s ASA 5515-X <a href="" target="_blank">security</a> appliance.</p> Networking Security Network Monitoring Network Security IDG Insider Tue, 23 Apr 2013 10:00:00 +0000 uphan 217036 at How to tell if Twitter, Facebook, and LinkedIn are paying off for you <p>As businesses make more use of social networks, the number of engagement, analysis and monitoring tools has exploded. Enterprises are trying to understand their return on social media investments, to find out if their Twitter and Facebook marketing campaigns are actually delivering customers. They want to track social mentions across multiple networks and be responsive to both kudos and complaints.</p> Applications Business Intelligence Networking CRM Network Monitoring Social Networking Business Intelligence IDG Insider Tue, 26 Mar 2013 10:00:00 +0000 uphan 215200 at Citrix outfits NetScaler with troubleshooting tools <p>Citrix has released new software to help users of its NetScaler ADC (Application Delivery Controller) more easily troubleshoot application performance problems in complex network and data center environments.</p> <p>Today's network-based applications are "pulling apart the model that IT departments have for troubleshooting," said Graham Melville, Citrix director of product marketing.</p> Applications Networking Virtual Desktop Network Management Network Monitoring Applications Wed, 20 Mar 2013 21:31:44 +0000 admin 214914 at Can a VPN log really point to employee slacking? <div id="tw-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 182px;"><img src="" alt="Can a VPN log really point to employee slacking?" width="243" height="182" align="right" /></div> <p>Yahoo CEO <a href="">Marissa Mayer's decision to ban telecommuting</a> has understandably generated a buzz, which has since grown louder a Networking Security Network Monitoring Endpoint Protection Tue, 05 Mar 2013 20:25:11 +0000 InfoWorld Tech Watch 213926 at Review: The best network monitoring system on earth <div id="Editors' Choice" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 200px; height: 150px;"><img src="" alt="Review: The best network monitoring system on earth" width="200" height="150" align="right" /></div> <p>The trouble with network monitoring is that the more you know, the more you find you need to do.</p> Data Center Networking Storage Virtualization Network Management Network Monitoring Data Center Networking Storage Virtualization IDG Insider Wed, 06 Feb 2013 11:00:00 +0000 Doug Dineley 212335 at Why virtualization breaks monitoring systems <p>I like to know what's going on with the stuff I manage, so I'm a big proponent of <a href="">heavily monitored infrastructures</a>. I've written more code to monitor, manage, and track IT infrastructure components than I can remember. Folks still email me about <a href="">plug-ins or code I wrote years ago</a> and have since completely forgotten.</p> Data Center Networking Virtualization Server Virtualization Network Monitoring Virtualization Mon, 17 Sep 2012 10:00:00 +0000 Paul Venezia 202272 at AppNeta takes cloud-based approach to network management <p>The rapid addition of consumer <a href="" target="_blank">tablets</a> and <a href="" target="_blank">smartphones</a> to corporate networks has created a greater demand for network-based application traffic analysis tools.</p> Consumerization of IT Networking BYOD Network Management Network Monitoring Thu, 05 Jul 2012 11:44:01 +0000 admin 197034 at Survey: IT spends too little time analyzing logs for security clues <p>Relatively few organizations are making good use of gobs of log data they collect for purposes such as identifying attackers, according to a survey of 600-plus IT professionals by <a href="" target="_blank">security</a> outfit SANS.</p> Data Center Networking Security Log Analysis Network Monitoring Network Security Security Management Thu, 03 May 2012 19:22:31 +0000 admin 192298 at How to land a cyber security job <p><a href="" target="_blank">Cyber security jobs are plentiful</a>, from government, financial services, and utilities to manufacturing and retail. But what skills do IT professionals need to qualify for these high-paying jobs?</p> <p>We asked the experts and came up with this list of five tips for landing a top-notch cyber security job:<a href=""></a></p> Security Access Control IT Jobs Cloud Security IT Training Cyber Crime Network Monitoring Mobile Security Identity Management Thu, 03 May 2012 16:03:50 +0000 admin 192326 at CopperEgg updates real-time monitoring for server processes <p>If you're interested in <a href="">real-time monitoring of your server processes</a> and seeing the overall condition of your Windows, Linux, and Mac OS X servers from a single console, you might want to take a look at the latest SaaS offering from <a href="">CopperEgg</a>, which just announced the updated version of RevealCloud 3.</p> Applications Cloud Computing Data Center Networking Virtualization Server Virtualization Network Monitoring SaaS Free Tools Systems Management Cloud Computing Virtualization Mon, 02 Apr 2012 17:50:43 +0000 David Marshall 189957 at Keeping up with your network requires consistent care and feeding <p>Few items in IT are more critical and less appreciated than <a href="">network and system monitoring frameworks</a>. These (almost) set-and-forget systems deliver tremendous value to any organization; they're critical to a healthy, stable infrastructure.</p> Data Center Networking Network Monitoring Systems Management Data Center Mon, 02 Apr 2012 10:00:00 +0000 Paul Venezia 189926 at Getting out of jail free <p>It's 1:30 in the morning. By some miracle, you were able to get approval for a four-hour <a href="">downtime window</a> to complete a long list of overdue patching and network maintenance. Even better, you're done a half-hour early. Life is good!</p> Data Center Data Explosion Networking Storage IT Training Network Architecture Network Monitoring Storage Management Systems Management Storage IDG Insider Mon, 09 Jan 2012 11:00:00 +0000 Matt Prigge 183425 at 26 helpful open source network management tools <!--paging_filter--><div class="field field-type-text field-field-slideshow-dek"> <div class="field-label">Dek:&nbsp;</div> <div class="field-items"> <div class="field-item odd"> Here are some high-quality network management tools based on open source and available at little or no cost </div> </div> </div> <div class="field field-type-nodereference field-field-slideshow-source"> <div class="field-label">Source:&nbsp;</div> <div class="field-items"> <div class="field-item odd"> <a href="/%5Bprimary-term-alias-prefix%5D/%5Bprimary-term%5D/network-world-044">Network World</a> </div> </div> </div> <div class="field field-type-number-integer field-field-essentials"> <div class="field-items"> <div class="field-item odd"> No </div> </div> </div> Applications Networking Network Analyzer Network Management Network Monitoring Network Tools Open Source Software Fri, 07 Oct 2011 10:00:00 +0000 Pete Babb 175129 at