Operations | Monitoring | ITSM | DevOps | Cloud

October 2023

Meeting the SEC's New Cybersecurity Rules: How Flowmon Empowers Public Companies To Comply

The much-anticipated cybersecurity rules by the U.S. Securities and Exchange Commission (SEC) for public companies have arrived, signaling a significant step forward from the proposed rules released in March 2022. These final rules, effective July 26, 2023, introduce new obligations that public companies must adhere to, promising a more secure and transparent corporate landscape. However, these regulations bring significant compliance challenges and litigation risks.

Got Ghosts in Your Enterprise Network?

Shining a light on the dark corners of the new enterprise network doesn't have to be as scary or overwhelming as some think. While “ghost issues” typically lurk in these sometimes unexplored places on the internet or in cloud environments, during this Halloween season your network operations teams can gain the confidence to not only uncover these network ghosts, but compel and cast them out forever.

What is Network Monitoring?

Today, more than ever, as IT environments become more diverse and complex, the need for an effective network monitoring solution has become paramount. However, with the digital environment, it’s constantly ever-evolving, so, these tools must keep pace with these changes to ensure they are still effective for users diagnosing issues and identifying bottlenecks within their network.

The Driving Force of Community at All Things Open 2023

The most noticeable takeaway from All Things Open 2023 was how visibly and demonstrably people were there for the event itself. Not to check a box or browse the swag but to be together, show their support of open source, and glean every last bit of knowledge they could.

How to Detect, Fix & Reduce Network Overload

Network overload is a modern-day nemesis we've all had to grapple with at some point. It's that heart-pounding moment when your network decides to take an unscheduled coffee break, right in the middle of that critical video conference or a major data transfer. But fear not, for this blog is your trusty guide to help you navigate the treacherous waters of network congestion with the finesse of a digital detective.

Monitor your multi-client network with OpManager MSP's agent-based monitoring

Monitoring a network for its uptime and peak performance is crucial. By tracking network performance, organizations can better understand their network requirements, gain in-depth visibility, identify mishaps quickly, and roll out remediation measures. However, this is easier said than done. The complexity only increases when the network is an MSP’s.

How do you troubleshoot a network problem?

Murphy’s Law states, “Anything that can go wrong, will go wrong.” This is an old adage that can be applied to IT networks everywhere. Organizations and IT admins can perfect their networks to the best of their powers, however, network issues of varying severities can still pop up. These network issues need immediate responses and resolutions. If such issues go unresolved for an unreasonably long time, the damages to both the network and the organization can be costly.

WAN Monitoring for Turbocharging WAN Performance

In an era defined by the relentless pace of digital transformation, the Wide Area Network (WAN) has emerged as the unsung hero of connectivity. With organizations expanding globally, remote work becoming the norm, and data flowing like a digital river, the WAN is the backbone that keeps the modern world interconnected. Yet, as the demand for high-performance, reliable, and secure WANs skyrockets, so do the challenges that network administrators face.

Fighting DDoS at the Source

For decades, the scourge of distributed denial of service (DDoS) attacks has plagued the internet. Join Doug Madory, Director of Internet Analysis at Kentik, and Aaron Weintraub, Principal Engineer at Cogent Communications, as they explain how organizations can identify customer networks sending the spoofed traffic that leads to DDoS attacks.

A Brief History of BGP Incidents

Kentik internet analysis expert, Doug Madory, discusses the most notable and significant BGP incidents in the history of the internet, from traffic-disrupting leaks to recent crypto-stealing hijacks. Stretching back to the AS7007 leak of 1997, this webinar uses a historical perspective to explore the questions: what progress has been made and what is the path to finally securing BGP?

MSP's As NOC's, Handling Multiple Clients

A Managed Service Provider (MSP) should invest in an Incident Management platform to ensure seamless service delivery and customer satisfaction. Such a platform streamlines Incident Response, improves service reliability, and enhances communication among teams. It helps MSPs in reducing Mean Time to Acknowledge (MTTA) and Mean Time to Resolve (MTTR) incidents, thereby minimizing downtime and service disruptions.

Importance of Network Monitoring

In today’s fast-paced digital world, the importance of network monitoring is growing by leaps and bounds. With real-time network monitoring, businesses can transform their user experiences and drive unstoppable growth. Whether you run a small business or a large corporation, incorporating network monitoring tools can help in the smooth functioning of your networks. Join us as we unveil the top benefits of network monitoring in the modern business landscape.

Running Containers On IPv6 Networks

What better motivation to start adopting a technology than the need to completely replace the alternative. From a world driven on limited resources like gas, coal, and oil to wind, hydro, nuclear, geothermal, and solar… we find ourselves, as a species, evolving past a first generation we envisioned as abundant, but turned sparse. Adopting IPv6 networking is another version of this same story.

What's New in Flowmon 12.3 Release

New release offers exciting new features such as new navigation menu and visual comparison of historical trends. Flowmon ADS 12.2 brings new IDS event visualisation, AI-assisted analysis, Threat Score, Additional insight into Application and platform and more. In this webinar product experts Martin Skoda and Filip Cerny will showcase new workflows and improvements in user experience that Flowmon 12.3 and Flowmon ADS 12.2 brings in live demonstration.

What Is Adaptive Flowspec and Does It Solve the DDoS Problem?

Managing modern networks means taking on the complexity of downtime, config errors, and vulnerabilities that hackers can exploit. Learn how BGP Flow Specification (Flowspec) can help to mitigate DDoS attacks through disseminating traffic flow specification rules throughout a network.

3 Strategies for Becoming a Network Visionary

As businesses become more digitized, IT leaders must consider the ability of the network to transform business operations in every functional area. Many organizations are already doing this today, demonstrating best practices in how the network can be an innovation partner in marketing, service delivery, customer service, and logistics, among many other areas. However, those who rest on their laurels today may find themselves playing catchup in the not-so-distant future.

SD-WAN Performance and User Experience: Gaining Unified Visibility with DX NetOps

As the use of SD-WAN continues to expand, benefits and challenges may seem to be proliferating in equal measure as well. In this post, we look at some of the advantages and obstacles presented by SD-WAN, and we detail how DX NetOps by Broadcom delivers the visibility teams need to monitor and manage their SD-WAN and legacy network environments.

How to Monitor Internet SLAs (Service-Level Agreements)

Whether you're streaming a movie, conducting a crucial Zoom meeting, or managing a data-intensive enterprise, a reliable Internet connection is non-negotiable. The Internet is expected to be fast, always available, and capable of handling your specific needs. But how can you ensure that your Internet service provider (ISP) is meeting these expectations? The answer lies in Internet Service Level Agreements (or Internet SLAs).

A Proactive Approach to Network Performance Management

In our digitally-driven world, networks serve as the backbone of every organization's operations. Whether you're a business, a healthcare facility, an educational institution, or a government agency, the efficiency and reliability of your network infrastructure can make or break your daily operations.

Gain the Visibility Needed to Hold Last-Mile ISPs Accountable: How AppNeta Can Help

In relatively short order, the adoption of cloud services and hybrid work models went from exception to ubiquity. This has fundamentally changed the nature of the networks users rely upon—and created an entirely new set of challenges for IT and network operations teams. More than ever, business services and interactions are reliant upon network connectivity that spans a diverse mix of the public internet and third-party networks.

Bare metal vs virtual machines vs containers: Which is the right infrastructure for me?

There are three main infrastructure types to consider when hosting and deploying applications: Bare Metal, Virtual Machines (VMs), and Containers, each with its own advantages and disadvantages depending on your use case. The three technologies are not mutually exclusive however, as both VMs and containers run on top of bare metal servers, while containers can also be deployed inside VMs.

See How I&O Leaders Can Monitor Strategy for Their Organizations' Specific Needs

Organizations must always be ready to pivot on a dime and adjust their business goals when the market—or their customers—demand it. Whether driven by industry changes or developments in market trends, when goals shift at the top, the teams who execute against them must follow suit. Since network infrastructure is becoming increasingly complex to fit business needs, IT teams are part of these initiatives.

Why Can't Network Teams Have Nice Things?

Let me tell you something you already know: Networks are more complex than ever. They are massive. They are confounding. Modern networks are obtuse superorganisms of switches, routers, containers, and overlays; a hodgepodge of telemetry from AWS, Azure, GCP, OCI, and sprawling infrastructure that spans more than a dozen timezones.

NOC Success Like Never Before: Automation Strategies for All-new Incident Management

Network Operations might never be the same. But then again, why would anyone want it to be? The power of automation and orchestration can bring incredible value to the Network Operations Center (NOC), including the business-critical call to get proactive and ahead of the incidence response and management game. It’s more than a towering volume of events – it’s the complexities involved, too.

Network Infrastructure Monitoring: Getting Started

The rapid evolution of technology profoundly impacts network infrastructure monitoring. New technologies such as containerization, microservices, and serverless computing introduce complexities that require monitoring solutions to adapt. The shift to DevOps practices, where development and operations teams collaborate closely, emphasizes the need for real-time monitoring and feedback loops to ensure continuous integration and delivery of applications and services.

4 Ways to Reduce Your Mean Time to Resolution

Dealing with a high MTTR in your network? Auvik Network Management is a comprehensive network monitoring and troubleshooting solution. With over 50 pre-configured alerts, it keeps you informed about critical network events. Users have the flexibility to customize these alerts and control notification frequency so that they have all the essential context to be able to fix issues.

Unleash optimal IT network performance with OpManager's Windows service monitoring capabilities

Windows services are the unsung heroes of Windows machines. This is because they act as critical components of the Windows operating system that run in the background to keep your computer running smoothly and securely. They are responsible for a wide array of tasks, including system startup and shutdown, security, performance, and application support.

How to Extract Insightful Data From Proxy Protocol Packets

Boosting the transparency of your load balancer traffic is advantageous. Web applications continually pass information back and forth, yet some of this important data is often hard to get during transit. And while the perceived “black box” nature of networking seems overwhelming, what if you could peek behind the curtain to better understand your traffic?

How AppNeta Passive Monitoring and Deep Packet Inspection Speeds Troubleshooting

In recent months, we’ve talked a lot about how AppNeta by Broadcom offers active monitoring capabilities, and how they enable teams to rapidly troubleshoot issues across both internally managed networks and those managed by third parties, such as ISPs and cloud providers.

SASE Monitoring: How to Monitor & Optimize A SASE Architecture

We've all heard the buzz about SASE (Secure Access Service Edge) and how it's revolutionizing the way we handle network security and connectivity. But let's face it, keeping your SASE architecture running like a well-oiled machine isn't a walk in the park. It's more like a continuous sprint, with multiple moving parts, countless devices, and the never-ending quest for optimal performance. Today, we're delving into the art and science of SASE monitoring.

Top 9 Port Monitoring Tools of 2024

We’ve compiled a list of 9 top-notch port monitoring tools that will help you stay ahead without breaking the bank. So strap in as we explore the world of ports through these beneficial applications and tell you about the best options on the market today! In this guide, you’ll learn… Looking for more amazing monitoring tools? Check out our post about the top 7 ping monitoring tools in 2024.

Network Utilization Monitoring: How to Check Network Usage

Whether you're a small startup or a large enterprise, the ability to access and share information quickly and reliably is essential for productivity, customer satisfaction, and overall business performance. However, as networks become increasingly complex and interconnected, it's crucial for businesses to gain deep insights into their network utilization.

Monitoring Policies: Enabling Scalable, Hands-Free Monitoring

AppNeta by Broadcom will soon offer monitoring policies that streamline monitoring setup and maintenance. Now available for preview, these capabilities will significantly reduce the time and effort required for ongoing operations, especially for customers with large-scale and dynamic sets of monitoring points.

3 Ways to Build a Network That Supports Business Innovation

In recent years, it has often been said that the network is a “utility” much like heat or hot water. It’s a necessity to the needs of daily life for much of the world’s population. In fact, the United Nations has called for universal internet access to be accepted as a basic human right by 2030. But as the network becomes more ubiquitous, there’s risk of it being taken for granted. Organizations that do this, however, will be putting themselves at a disadvantage.

Traceroute Troubleshooting: How To Identify Network Issues with Traceroutes?

Whether you're a seasoned network administrator or a curious tech enthusiast, the ability to diagnose and resolve network issues is an essential skill. When it comes to troubleshooting network problems, few tools are as powerful and revealing as the humble traceroute. In this blog post, we'll delve into the world of traceroute troubleshooting, uncovering its inner workings and demonstrating how it can be your secret weapon in identifying and resolving network issues.

3 Essential Mobile Apps for Optimizing Your Device

Mobile devices have already become an extension of ourselves. We rely on them for communication, entertainment, work, and so much more. However, to ensure that we are making the most out of our gadgets, it's essential to equip them with the right set of apps. In this article, we'll explore three types of must-have apps that will optimize your device and enhance your overall mobile experience: productivity, security, and entertainment apps.

Why Your Load Balancer Should Be Fast & Flexible

The intersection of economic uncertainty and digital transformation presents a unique challenge for businesses. With the fear of a recession looming overhead, there’s no doubt that choppy waters await, but what does this mean for IT when tech spending can significantly impact the bottom line? While IT spending is a priority for many, businesses are still seeking ways to reduce non-essential spending and upgrade outdated infrastructure.

Understanding & Reducing Network Round-Trip Time (RTT in Networking)

In the dynamic realm of modern business operations, the heartbeat of connectivity relies on the seamless flow of information across networks. Network administrators and IT professionals, entrusted with the pivotal responsibility of maintaining these vital lifelines, understand the significance of every nanosecond.

SmartNICs in telco: benefits and use cases

In our previous blog, we introduced smartNICs as technology enablers for next-generation converged data centres. We covered how smartNICs can increase efficiency and drive return on investment. In this blog post, we explain how this innovative technology can help the telecom industry. SmartNICs use cases for the telecom sector are still emerging. However, when they arrive, it will be big for the sector, especially at edge clouds where speed in user plane packet processing matters the most.

Network Segmentation: Definition and Key Benefits

In the ever-evolving landscape of network security, the challenges faced by Managed Service Providers (MSPs) and technical managers are multifaceted, and the need for robust security measures becomes paramount. Amidst this backdrop, network segmentation remains a pivotal strategy. This article delves into the intricacies of network segmentation, its significance, and a roadmap to its successful implementation.

Ending Saint Helena's Exile from the Internet

Just after midnight on October 1, 2023, the remote island of Saint Helena in the South Atlantic began passing internet traffic over its long-awaited, first-ever submarine cable connection. In this blog post, we cover how Kentik’s measurements captured this historic activation, as well as the epic story of the advocacy work it took to make this development possible.

What is Infrastructure Monitoring : Comprehensive Guide

Tired of being a firefighter in your IT department who is always battling issues after they erupt? Well, you’re not the only one. With IT infrastructure becoming more complex day by day, IT managers across the globe face the same challenge. But not anymore. Infrastructure monitoring tools are here to save the day by empowering IT managers to not only predict but also prevent IT infrastructure issues. But how?

HAProxy's Growth Continues with Rave Reviews and Powerful Capabilities

The G2 Fall 2023 Reports are in! And while leaves are on the verge of tumbling downward, HAProxy's acclaim across multiple categories, market levels, and global segments has only risen. For companies looking for—or migrating from—a load-balancing solution, HAProxy delivers simple adoption, scalable performance, strong security, and observable operation. Altogether, across six product categories HAProxy featured in 58 reports and won 30 badges, including “Momentum Leader”.

The Path to a Dark NOC: Actionable Initiatives to Achieve Full Autonomy

A Dark Network Operations Center (NOC) is one that runs with no IT staff … at least that’s how it’s been defined up until now. But there’s more to interpret. Large, complex networks rely on the NOC — the core of network infrastructure — to keep them healthy and resilient. The NOC’s function allows employees, customers, partners, and other network users to rest a bit easier, and its integrity and accuracy gives them peace of mind.

Unlocking Network Capacity Monitoring & Planning: From Overload to Overdrive

In the world of networking, where connectivity and data flow are at the heart of operations, a network hiccup can spell disaster. The digital transformation wave has engulfed businesses of all sizes, and as companies become increasingly reliant on their networks to serve customers, collaborate with teams, and manage critical processes, the demand for robust and efficient network performance has never been higher.

A Guide to Assessing Cloud Server Pricing

Businesses and individuals wanting to leverage cloud services must pay prime attention to it. They will need to boost their understanding of how cloud servers work and practice informed decision-making in areas of cloud usage and optimization of costs. To address this, we'll seek to understand the key components of cloud computing as a resource for cloud server pricing guide and explore computing resources. After that, consideration shall also be given to data transfer costs, network bandwidth, and latency.

What is a smartNIC and how is the technology shaping modern data centres?

Data centres are going through a transformation. Gradually, we will see a new type of equipment attached to servers in almost every data centre: smartNICs are here. They will be the enablers of converged data centres where common infrastructure tasks are offloaded from a host server to attached network interface cards (NIC).

Predictive Network Technology in 2024

IT networks generate large volumes of information in the form of security, network, system and application logs. The volume and variety of log data makes traditional network monitoring capabilities ineffective — especially for monitoring use cases that require proactive decision making. These decisions are based on things like: All of this makes large-scale and complex enterprise IT networks a suitable use case for advanced AI and machine learning capabilities.

Build Your Own Network with Linux and Wireguard

Last Christmas, I bought my wife “Explain the cloud like I am 10” after she told me many times that it was hard for her to relate to what I am doing in my daily work at Qovery. While so far, I have been the sole reader to enjoy the book, I was wondering during my lecture if there were any resources to explain how to build all that. Most topics are software oriented.. So, in this article, I am going to explain how to build your own cloud network 🎊

Upgrade to DX UIM 20.4 CU9 to Leverage New Features and Security Updates

DX Unified Infrastructure Management (DX UIM) is a powerful solution that enables comprehensive infrastructure observability across your digital ecosystems, including private, public, and hybrid clouds. With DX UIM, you can proactively and efficiently manage the performance and availability of your IT infrastructure and applications. DX UIM 20.4 is the current main branch of the solution. This release offers a number of significant capabilities that weren’t available in earlier versions.

How to Monitor Hybrid Networks for End-to-End Visibility: Hybrid Network Monitoring

Hybrid networks, which combine on-premises infrastructure with cloud-based services, have become the backbone of modern operations. While they offer numerous advantages, they also present unique challenges when it comes to network monitoring and management. Maintaining the health and security of a hybrid network requires a comprehensive understanding of its intricate architecture and real-time visibility into its performance.

Announcing HAProxy Enterprise 2.8 & HAProxy ALOHA 15.5

HAProxy Enterprise 2.8 and HAProxy ALOHA 15.5 are now available. Users of our enterprise-class software load balancer and hardware/virtual load balancer appliance who upgrade to the latest versions will benefit from all the features announced in the community version, HAProxy 2.8, plus some features that enhance the flexibility of our enterprise security options to meet even more use cases.

State of the Internet: Monitoring SaaS Application Performance

With the increasing reliance on SaaS applications in organizations and homes, monitoring connectivity and connection quality is crucial. In this post, learn how with Kentik’s State of the Internet, you can dive deep into the performance metrics of the most popular SaaS applications.

Broadcom Delivers Advanced Network Management Capabilities to Optimize Network Operations, Accelerate Network Transformation and Enhance Connected Experiences

We are pleased to announce the availability of Network Management by Broadcom, which includes DX NetOps 23.3 and AppNeta. It assures end-to-end observability, minimizing the visibility gaps beyond the network borders to Cloud, SaaS, and Sites. The solution provides a unique and industry-leading unified Network Management approach, allowing organizations to optimize network operations, accelerate transformation and enhance connected experiences.

Utilizing Synthetic Testing in Networking (Synthetic Network Testing)

Network performance is the lifeblood of modern enterprises, underpinning everything from communication to data transfer, and even the smooth functioning of mission-critical applications. A single glitch can lead to downtime, productivity losses, and dissatisfied users. This is where synthetic testing steps into the spotlight as an invaluable tool for ensuring your network's reliability and resilience.

What is IPAM (IP address management)

The ability to manage IP addresses within a network is crucial for effective network management, especially as networks become more complex and have to manage more demanding loads. Assigning hundreds or even thousands of IP addresses to devices that may be highly distributed or disparate is no simple task. Once devices leave the network, those IP addresses may need to be deleted, plus there’s always the risk of IP address conflict.

Triangulate: Add Logs to Your Monitoring Mix

For many IT organizations, triaging or troubleshooting starts with assessing symptoms. As practitioners investigate the causal factors by answering each of the “5 whys,” logs are often where the actual root cause answers lie. This is even more true for issues related to configuration changes, change management, and security. However, diving into log data can be overwhelming as a first step due to the high volume and velocity of logs and missing context.

Digital transformation trends in oil and gas

The Oil and Gas sector, responsible in part for two industrial revolutions in the last 300 years, has been something of a laggard when it comes to adoption of new technologies. Cloud and edge penetration in Oil and Gas is late compared to other industries, mainly due to long standing concerns around security and data privacy.