Operations | Monitoring | ITSM | DevOps | Cloud

September 2022

Why OpManager is the perfect tool to detect and troubleshoot Wi-Fi performance issues

Wi-Fi has untangled humanity, quite literally. Those jumbled Ethernet cables with their confusing ports are banished to backstage. Now, all we need is one connection to a Wi-Fi router and voila! Internet. Wi-Fi networks simplify your IT infrastructure. WLAN networks makes an office look less like a scene from The Matrix and more like a creative workspace, but it can bring an array of difficulties as well. Unlike the sturdy Ethernet cable, Wi-Fi connections fluctuate.

6 Best Network Inventory Documentation Tools

Although network inventory documentation isn’t the most glamorous task, it is essential for the success of any IT department. According to Steady Networks, “Workers spend about 22 minutes each day dealing with some type of IT issue.” An accurate network inventory can greatly reduce the time it takes for internal IT to identify and solve issues.

Troubleshoot SasS Experience Packet Loss at the User Edge

In this demo, we showcase Experience-Driven NetOps from Broadcom Software that includes AppNeta digital experience monitoring and DX NetOps network monitoring software. The combined solution provides the most comprehensive visibility for true end-to-end user experience network delivery assurance for today's network operations teams.

Anatomy of an OTT traffic surge: Thursday Night Football on Amazon Prime Video

This fall Amazon Prime Video became the exclusive broadcaster of the NFL’s Thursday Night Football. This move continued Prime Video’s push into the lucrative world of live sports broadcasting. While they had previously aired TNF, as it is known, this is the first season Amazon Prime Video has exclusive rights to broadcast these games. As you can imagine, airing these games has led to a surge in traffic for this OTT service.

Network Log Archiving = Perfect Backwards Visibility

Network monitoring is ideal for getting a real-time view of your connected environment, and with reports, you can look back in time too. Logs are key to this rear-view mirror look, as they contain all the data for all the elements you are monitoring. But without network log archiving, you can only look back so far. Did you know that according to an IBM/Ponemon study, it takes an average of 287 days to discover and contain a data breach?

Virtual CISO Services: A New Revenue Stream for MSPs?

As you look to optimize your MSP’s growing business, it’s going to become more and more important to maintain an acceptable return on your investment. To do this, you’ll need to find services that increase your gross margin on every client engagement. Virtual CISO services can greatly help in this function. While solutions like Auvik already help MSPs have visibility inside of client networks, we want to take this a step further with the addition of vCISO services.

Multi-cloud trends in the media sector

The cloud is helping organisations in the media and entertainment sector unlock new levels of efficiency and speed as they find themselves under pressure to produce and distribute content faster than ever before. In our latest blog we look at how a Network-as-a-Service model can enhance their multi-cloud strategy.

Troubleshoot ISP, Cloud and SaaS Network Delivery Issues with Experience-Driven NetOps

In this demo, we showcase Experience-Driven NetOps from Broadcom Software that includes AppNeta digital experience monitoring and DX NetOps network monitoring software. The combined solution provides the most comprehensive visibility for true end-to-end user experience network delivery assurance for today's network operations teams.

Fundamentals: Application Acceleration and the Benefits for your Service Delivery

Application acceleration is all about improving the responsiveness of a digital service. When clients access web applications, they are expecting near-immediate feedback from servers. Maintaining that level of performance requires ensuring the right resources are available to process requests, shortening the information retrieval process, and maintaining system uptime by warding off threats.

A NetOps Guide to DDoS Defense

Join Kentik and Cloudflare as we discuss and analyze the latest in DDoS attack trends. (We’re seeing some really interesting patterns in our data!) Back by popular demand: Doug Madory, Kentik’s Director of Internet Research, will walk through how BGP monitoring can determine if DDoS mitigations are actually effective. What you’ll learn.

Take Network Monitoring to the Extreme with WhatsUp Gold/Flowmon Duo

Network monitoring is the key to efficient, reliable operation, as well as performance and security. The deeper and more broadly you can monitor (yes, you want to do both), the better your network operates. What if you could combine a superstar in network infrastructure monitoring with the champion of network flow monitoring? You can. Progress, owner of WhatsUp Gold, recently acquired Kemp and their market-leading Flowmon solution.

What can be learned from recent BGP hijacks targeting cryptocurrency services

On August 17, 2022, an attacker was able to steal approximately $235,000 in cryptocurrency by employing a BGP hijack against the Celer Bridge, a service which allows users to convert between cryptocurrencies. In this blog post, I discuss this and previous infrastructure attacks against cryptocurrency services. While these episodes revolve around the theft of cryptocurrency, the underlying attacks hold lessons for securing the BGP routing of any organization that conducts business on the internet.

Troubleshooting SaaS User Experiences with AppNeta from Broadcom Software

Many organizations are moving to SaaS-based hosting environments but how do you monitor the user experience of these apps when they no longer exist within the four walls of your data center? In this demo, we are going to reveal how network operations teams can gain true visibility into the user experience with AppNeta from Broadcom Software - even when they do not own any of the network infrastructure delivering that experience.

Harness Continuous Observability to Continuously Predict Deployment Risk

In my previous blog, I discussed how continuous observability can be used to deliver continuous reliability. We also discussed the problem of high change failure rates in most enterprises, and how teams fail to proactively address failure risk before changes go into production. This is because manual assessment of change risk is both labor intensive and time consuming, and often contributes to deployment and release delays.

Make Your MSP a Recession-Proof Business

Many believe we’re either in a recession or on the brink of one. It’s a familiar cycle: high inflation, international strife, supply chain challenges, and tightening monetary policies are all driving fears of a downturn. While the IT industry has exceeded expectations for the past few years, it isn’t immune to a recession. As a result, many IT MSPs are thinking about what they can do to ensure a recession-proof business over the next year and beyond.

The Cloud And SD-WAN

As more and more businesses move to the cloud, they discover that their traditional wide area networks (WANs) can no longer serve their needs. SD-WAN is a networking solution that offers many other benefits over traditional WANs, including reduced costs, improved performance, and increased flexibility. But what does SD-WAN stand for? Below, we'll take a deeper look at what SD-WAN solutions are and how they can help your business take advantage of the cloud.

Internet Availability Threats Following the Russian invasion of Ukraine

Since Russia’s invasion of Ukraine on February 24, 2022, denial-of-service (DoS) attacks impacting availability have been rising. The attacks aren’t only affecting Russia and Ukraine either. Public and private organizations in multiple industries have been impacted, and several nations—including the U.S. and U.K.—have issued warnings about cyberthreats from Russia.

DX UIM 20.4, Cumulative Update 4: What's New and Why Upgrade

At Broadcom Software, we’re constantly trying to speed value delivery and minimize upgrade efforts for our customers. Toward that end, the DX Unified Infrastructure Management (DX UIM) team releases cumulative updates every calendar quarter. In addition to quality fixes, these cumulative updates include performance improvements, feature enhancements, and expanded platform support. Recently DX UIM 20.4, cumulative update 4, was released for both Operator Console and Server Core packs.

3 Lessons from a DNS Resolution Failure Incident

Whether you are a Site Reliability or Network Engineer, or simply involved in monitoring a digital service, you know by now that if DNS is not working properly – your users are experiencing an outage. However, despite its importance in ensuring the resilience and availability of the web, DNS is often not monitored correctly, which can mean undetected outages and any associated ripple effects on your business.

8 reasons why network observability is critical for DDoS detection and mitigation

Distributed denial-of-service (DDoS) attacks have been a continuous threat since the advent of the commercial internet. The struggle between security experts and DDoS protection is an asymmetrical war where $30 attacks can jeopardize millions of dollars for companies in downtime and breaches of contract. They can also be a smokescreen for something worse, such as the infiltration of malware.

Application Experience Depends on Your Network Experience

The network is designed to connect the organization’s users, partners, customers and visitors, but those connections are useless without software. While applications run on internal servers, end points and the cloud, the performance of the network in large measure defines the performance of the application, and this performance is what user experience and application experience (AX) is based on.

How Cribl Stream Helps Enterprises Handle UDP Syslog Challenges

Syslog is a very common method for transmitting data from network devices and open systems servers data to analytics platforms like Elastic and Splunk. As adaptable as syslog is, it still has significant constraints, which is a pain for most companies that lack the resources to scale their capability needed for syslog.

Securing the DX NetOps Development Lifecycle with DevSecOps

Recent, high-profile cybersecurity exploits, such as Sun Burst and Log4j, demonstrate that every enterprise is only a stone’s throw from a software vulnerability. This becomes especially critical when security is breached in a network monitoring component that has privileged access to core enterprise systems. In the case of Sun Burst, a well-known monitoring software provider made international headlines.

Zoom Phone Delivers Local Survivability with Ribbon SBCs

Migrating to a cloud-based phone system is compelling because it eliminates the costs and time associated with deploying and managing legacy phone system/PBX hardware and proprietary business phones. However, moving 100% of an organization’s communications infrastructure off-site can present new challenges. If the connection to the cloud is lost, a site could lose both external communications and intra-site communications.

Comparing Ways to Connect to Microsoft Azure

Curious about Microsoft Azure and the best ways to connect? Azure is a hybrid Cloud Service Provider (CSP) with customized, scalable, cloud-based packages. These encompass Software as a Service (SaaS), based on subscription-based software licensing and delivery, Platform as a Service (PaaS), allowing companies to develop, deploy, manage, and update applications, and Infrastructure as a Service (IaaS), providing high-level application programming interfaces (APIs).

Multi-cloud trends in the retail sector

In retail, the cloud changes everything because it offers flexibility and the opportunity to do things better, or to do things that were previously impossible, for a lower cost. This is especially true in a multi-cloud and hybrid cloud environment, where retailers can connect their legacy private data centres with public clouds to enhance their offering and make it more competitive.

Managing the hidden costs of cloud networking - Part I

Technologies like virtualization and containerization have gained significant traction over the last decade as foundational tools for modern application development. As companies like Amazon (AWS), Microsoft (Azure), and Google (Google Cloud) started to invest in the hardware and software infrastructure required to support access to these virtualized resources, “the cloud” was born.

What Is Cisco ACI?

Cisco ACI is an enterprise-class, software-defined networking (SDN) solution that provides complete control of the data center network. Using a policy-based approach, Cisco ACI delivers security, performance, and scalability for today’s demanding applications. Cisco ACI is part of the broader Cisco SDN portfolio, which also includes Nexus switches and Application Centric Infrastructure (ACI) controllers. If you are looking for a way to improve your data center network, Cisco ACI may be the answer.

The NetOps Expert - Episode 6: Welcome to the Experience-Driven NOC

Jeremy Rossbach, Head of DX NetOps Product Marketing and Jason Normandin, DX NetOps Product Management discuss the integrations of AppNeta digital experience monitoring and DX NetOps network monitoring to deliver the industry-first Experience-Driven Network Operations Center.

Streamline Your Amazon VPC Flow Logs Ingestion to Splunk

Amazon Web Services (AWS) recently announced the ability to publish VPC Flow Logs directly to Amazon Kinesis Data Firehose. For Splunk customers, this feature helps to optimize the architecture to send VPC Flow Logs directly to Splunk Enterprise or Splunk Cloud Platform. With a fully managed service like Amazon Kinesis Data Firehose, users don’t have to worry about scaling, and can optionally transform their data in near real-time and enjoy the cost-effective, reliable service.

Why is Network Monitoring and Network Log Management So Crucial?

Without Network Monitoring, there is no good way to get a real-time view of your connected environment. But with Network Monitoring reports, you can look backwards to spot problems and trends. Just as vital are logs that deepen this rear-view mirror look, as they contain all the data for all the elements you are monitoring.

Why Your MSP Needs a Network Infrastructure Tool?

As a new or growing MSP, discovering tools and processes that will let you do more with less is a prime focus. You’re always looking for ways to boost that bottom line by cutting costs, driving more revenue, and improving overall efficiency. If you have more than a handful of employees, you’ve likely already implemented a good MSP network monitoring tool and PSA (professional services automation) tools.

Sending NGINX Logs to Honeycomb is Darn Easy

Written by Andrew Puch and Brian Langbecker You use NGINX as a proxy for your application, and you want to leverage your favorite features in Honeycomb to help make sense of the traffic data. Have no fear: Honeycomb is more than capable and ready to help! Things you will need: Before you start with the instructions, let’s discuss a lightweight tool called Honeytail. This utility will tail log files, parse the various formats, and send the data to Honeycomb.

SecurityDAM's NOC Management Takes Off With MoovingON.ai Platform

When SecurityDAM (acquired by Radware), a DDoS protection service provider, needed to upgrade their NOC operations, they tested out multiple solutions before choosing MoovingON.ai. From increasing efficiency and visibility to improving ticket resolution times and runbook automation, MoovingON.ai provided the NOC manager and team with everything they needed to run operations more smoothly and effectively.

Sponsored Post

How to Get Real-Time Network Insight into Microsoft Teams Call Quality

A recent Exoprise customer survey found that 60-70% of application problems occur within the enterprise environment or home network/ISP. So, if you need to resolve Teams call quality problems, it's best to investigate your network before you try and finger point to Microsoft. In today's article, we see how this applies to Exoprise when team members work from home or in a hybrid work setting. Last Friday, at about 10:00 am EST, I jumped on an impromptu video call with one of my sales colleagues to discuss an ongoing marketing project. Although I am based in the Northern Virginia area, my comrade (as they say in British English!) is from Boston.

5 Best Practices of Network Security Monitoring

According to Accenture’s “State of Cybersecurity Resilience 2021” report, security attacks have increased 31% from 2021 to 2022. This statistic shows that organizations are not ready with a robust security plan and lack continuous network monitoring, resulting in security loopholes. Efficient network infrastructure is crucial for the success of your enterprise.

Fundamentals: Load Balancing and the Right Distribution Algorithm for You

With the right load balancing in place, the demand of increasing web traffic can become manageable, but how do you determine which load balancing algorithm is best suited for your applications? Does the ease of use of static load balancing better suit the services you provide, or would your system benefit from a more complex and dynamic set of algorithms to maximize efficiency? In this blog post, we discuss what to consider when deciding on the right load-balancing algorithm.

THWACK Livecast: Automating Your Way Beyond Simple Incident Management

Presented by: Kevin M. Sparenberg (KMSigma) and David Russell (david.russell.CSM) It’s time to take your service desk solution to the next level with automation rules. Built on the framework of simple rules, you can improve efficiency, refine standardized processes, and transform the way your organization runs. This THWACK© Livecast is all about how automation rules in SolarWinds© Service Desk can help lighten the load and allow your teams to focus on those big picture projects which actually improve the business. Let's stop getting bogged down in the minutia and manual interaction of incident management and instead look at ways to lighten your load.

7 Ways to Slam Dunk Your Next Network Assessment Using Auvik

So, you’re an MSP that’s recently won a new client. As part of the deal, you’ve promised a network assessment: a look at the overall network to determine if there are any glaring issues that will interfere with day-to-day operations. The topology is vast, spanning multiple sites and dozens of switches and firewalls. How do you act quickly? And what should you be looking for? Here are 7 network assessment tasks Auvik can help you easily complete.

Higher Education and the Persnickety Network: How Monitoring Comes to the Rescue

Colleges and universities face immense IT challenges. The end user base is regularly overturning with students coming and going. And residential students are just part of the problem. Increasingly, schools support extensive distance learning, which only gained ground thanks to COVID. Now that remote work and distance learning are the new mandates, there are even more difficult challenges for Higher Education IT to deal with.

Monitor Physical Servers and Virtual Machines with WhatsUp Gold

In today's world, monitoring your servers is more important than ever before. With proper monitoring, you can understand system resource usage and identify performance-related issues like utilization, downtime, and response time. As a network or system admin, you know how vital server uptime is. On the reverse, how downtime can be detrimental to your business and your staff's productivity, resulting in loss of sales and, therefore, loss of revenue.