Nov 2023: What's New at Kentik?
Have you ever sat down and thought to yourself, “What’s new at Kentik?” Well, you’re in luck! Welcome to the first edition of a blog series to highlight the best and brightest of Kentik that month.
Have you ever sat down and thought to yourself, “What’s new at Kentik?” Well, you’re in luck! Welcome to the first edition of a blog series to highlight the best and brightest of Kentik that month.
HAProxy Fusion 1.2 is now available, making it even simpler to adopt modern, scalable application delivery. New efficiencies, workflows, and form factors enable you to be more productive, use familiar tools, and explore powerful new use cases.
By 2030, the world will look very different, not in the least because of new technological innovations. Many will expect to see a proliferation of next-generation technological solutions from smart cities, to augmented reality, to autonomous cars, to the metaverse. Service providers have a role to play in ensuring that the underlying network that we have across the UK (and beyond) has the capacity and scalability to support these solutions.
Network monitoring is a critical component in network management, ensuring that all systems and services are running smoothly. Monitoring a network involves continuously surveilling network components to detect any potential issues or performance bottlenecks that may arise. Doing so guarantees that the network’s performance remains at its peak, providing users with a seamless experience.
A smooth business operation hinges on maintaining a robust and efficient network. Proactively identifying and addressing issues before they impact users is critical. Network monitoring plays a pivotal role, and a network monitoring dashboard is a key tool in the arsenal.
When the concept of Zero Trust emerged in 2010, it marked a sea change in how IT and network security are handled. The term, invented by Forrester Research analyst John Kindervag, is loosely based on the “never trust, always verify” motto. So why is this a sea change? Before 2010, IT focused on perimeter defenses and the concept of DMZs — areas of the network they deemed safe based on the protection they implemented.
Is there a gap between the potential of network automation and widespread industry implementation? Phil Gervasi explores how the adoption challenges of network automation are multifaceted and aren’t all technical in nature.
On-premise or SaaS network monitoring tool: which one to choose? This question has been bugging many businesses for quite a few years now. And no matter how much I hate to say it but the answer to this burning question is — it depends. Yes, it depends on several factors. In this blog, we will list all those factors that you should keep in mind before making this decision.
In this edition of the Cloud Observer, we dig into the impacts of recent submarine cable maintenance on intercontinental cloud connectivity and call for the greater transparency from the submarine cable industry about incidents which cause critical cables to be taken out of service.
When the concept of Zero Trust emerged in 2010, it marked a sea change in how IT and network security are handled. The term, invented by Forrester Research analyst John Kindervag, is loosely based on the “never trust, always verify” motto. So why is this a sea change? Before 2010, IT focused on perimeter defenses and the concept of DMZs — areas of the network they deemed safe based on the protection they implemented.
In today's interconnected world, the reliability of network infrastructure, especially Cisco Catalyst switches, plays a key role for businesses. To ensure these critical components perform optimally, it's vital to monitor their metrics effectively. This article will show you how to effortlessly monitor Cisco Catalyst metrics with Grafana, a top-tier monitoring and visualization platform.
The release of 4.1 comes with some exciting updates. Web management address discovery now becomes a breeze with Autodetection. Firmware Updates now support Panduit Gen5 and nVent Enlogic EN2.0 rack PDUs. Not to mention, the Location Layout offers enhanced floor plan visualization with convenient export options. These updates and more provide you with better control and improved visibility.
Proactive network monitoring is no less than a superpower. Just like how the Spidey sense alerted Spiderman of any dangers, proactive network monitoring also helps you to: This is why every business big or small is investing in proactive monitoring to optimize their systems and resolve security issues in real-time. In this blog, we will share some of the key benefits of proactive network monitoring along with the top challenges and best practices that can help your business in the long run.
ManageEngine OpManager MSP now features the integration of the IP address management (IPAM) and switch port mapper (SPM) add-on. But what does this mean for MSPs, and how can it solve the challenges MSPs face daily?
For those who remember the tech world before the COVID digitalisation gold-rush, the 2019 assertion by Gartner that 'The Data Centre Is (Almost) Dead, ruffled feathers. The report warned that by 2025, 80% of enterprises will shut down their traditional data centres. In fact, 10% of organisations already have. Then the pandemic hit and the global demand for world-class user experiences (for workforces and customers alike) exploded.
Tailscale is a modern remote access solution that allows customers to easily scale, segment, and manage a private network as their business grows. It enables encrypted point-to-point connections using the open source WireGuard protocol, so that devices on your private network can only communicate with each other.
Kubecon 2023 was more than just another conference to check off my list. It marked my first chance to work in the booth with my incredible Kentik colleagues. It let me dive deep into the code, community, and culture of Kubernetes. It was a moment when members of an underrepresented group met face-to-face and experienced an event previously not an option.
Digital Experience Monitoring (DEM) has become an area of focus for Secure Access Service Edge (SASE) vendors. As businesses adopt SASE or security-as-a-service technology for compliance and security, they must consider the overall employee digital experience. SASE architectures add network overhead and impact performance, response times, and latency. In this article, we will delve into.
Bandwidth Monitoring is a vital function essential for the smooth flow of data and business success in the digital landscape. Many businesses, individuals, and data centers use networks to share information or services with each other. However, at times customers may experience poor results from unreliable connections, but these problems could also be signs of more serious network problems.
The entire reason we have monitoring is to understand what users are experiencing with an application. Full stop. If the user experience is impacted, sound the alarm and get people out of bed if necessary. All the other telemetry can be used to understand the details of the impact. But lower-level data points no longer have to be the trigger point for alerts.
Last week a major internet outage took out one of Australia’s biggest telecoms. In a statement out yesterday, Optus blames the hours-long outage, which left millions of Aussies without telephone and internet, on a route leak from a sibling company. In this post, we discuss the outage and how it compares to the historic outage suffered by Canadian telecom Rogers in July 2022.
Incident response in a Network Operations Center (NOC) is cumbersome and time-consuming. There are many steps, many sources where incidents come from, and a long, long list of complexities involved. For instance, for incident response with a NOC, there’s the initial monitoring – Tier 1 functions of “eyes on glass” work of looking at alerts coming in and what they’re for, such as a security breach, performance issue, a hardware failure, among others.
Ribbon has multiple solutions for Microsoft Teams Calling - https://ribboncommunications.com/solutions/enterprise-solutions/microsoft-solutions-teams-direct-routing
The sun has officially set on KubeCon North America 2023, but the CNCF's flagship event has left a lasting impression on us. Roughly 9,000 Kubernetes enthusiasts descended on Chicago's McCormick Place West to see the K8s community's latest innovations. DevOps professionals, engineers, and architects alike were eager to share and boost their K8s knowledge. Overall, HAProxy joined over 250 other sponsor organizations to celebrate open-source, cloud-native technologies over four activity-packed days.
Robust app security is non-negotiable, but the spiraling costs that can come with it are. In the context of application delivery, security plays a pivotal role in maintaining business continuity, protecting sensitive data, and upholding a solid reputation. However, the journey to build a formidable defense at the load balancing and reverse proxy layer can quickly become costly with a few wrong turns. Security is important, but buyers don’t have to break the bank to implement it.
Routers are essential for connecting devices. Routers decide where the internet goes and how fast it should be. Because they play such a crucial role, it's vital to keep an eye on them and make sure they're doing their job well. This act of keeping an eye on routers is what we call "router monitoring." Monitoring routers isn't just about checking how the routers are doing; it's about making sure the whole network works well.
VPN issues are easily some of the most common digital workplace problems to plague end user computing (EUC) teams. When the VPN crashes or falls out of compliance, it can have a disproportionate impact on employee experience. Monitoring and managing VPN performance is a top priority for many of our customers – including Qualcomm Incorporated. Qualcomm had a known VPN issue taking place in their environment impacting 90% of their workforce.
Government agencies and public sector organizations are a tantalizing hacker target. Cybercriminals go after public sector organizations because they hold confidential, often classified, information – the exact data state-sponsored and other criminal groups salivate over. The Cybersecurity and Infrastructure Security Agency, or CISA, along with the United States Computer Emergency Readiness Team, or CERT, have warned public sector IT of key threats.
Today, automation has shifted from being a luxury to an absolute necessity, especially within the realm of networks. This shift is driven by the rapid evolution of network technologies, compliance standards, and evolving business needs, placing an increasingly daunting burden on network administrators to manage these tasks manually.
Today, organizations of all sizes heavily depend on Information Technology Service Management (ITSM) solutions to elevate operational efficiency and customer satisfaction. The advent of cloud technology has presented a jaw-dropping opportunity for numerous businesses, given the benefits that cloud-based ITSM solutions provide.
Kentik Kube provides network insight into Kubernetes workloads, revealing K8s traffic routes through an organization’s data centers, clouds, and the internet.
The word "cache" is used in many different contexts. Typically, a cache is a small chunk of data stored locally for quick access. In this case, it’s about computer caches, i.e., the data stored in memory. Micro-caching is a technique where a programmer uses this cached data to do some quick computations, which can lead to some amazing solutions. In micro caching, dynamically generated content is cached for only a brief period rather than full-page caching.
Ensuring uninterrupted network availability is paramount for any organization relying on multiple network devices for their day-to-day operations. Two crucial metrics that govern network availability are performance and fault management. By implementing ManageEngine OpManager as your fault and performance monitoring tool, you gain invaluable insights into device health, CPU performance, and more.
Network monitoring and alerting provide the foundation for efficient IT operations and cyber resilience. By keeping track of the status and performance of network infrastructure and applications, network monitoring tools can automatically generate alerts when defined thresholds are exceeded or specific events occur. These network monitoring alerts allow IT teams to detect outages, performance degradation, and potential security incidents so they can respond swiftly to minimize disruption.
Broadband subscriber behavior analysis is the process of collecting and analyzing data on how broadband subscribers use the internet. This data can be used to gain insights into subscriber needs and preferences, as well as to identify potential problems with the broadband service.
While remote work and hybrid work have always been a thing, they've recently become more popular, and that’s created new challenges for network security. Some companies embrace remote work and/or hybrid work; some try to limit or reverse the trends. For some internal teams, remote work is easily achieved and often preferred. In other cases, in more hands-on and collaborative efforts, being physically onsite can be important.
According to a study by Zippia, 70% of the organizations already have a digital transformation policy in place or are currently working on one. This implies the growing significance of modernization in IT. With new-age techniques such as SD-WAN, organizations can deliver an enhanced end-user experience, ensure reliable QoS, enhance their network security, optimize their network performance, and reduce their overhead costs.
Baseball fans know about the various in-game statistics and actions requiring someone to keep them as records. From a player's overall performance at-bat to a game's final score at the bottom of the ninth, dozens (possibly hundreds) of different statistics are happening throughout a season. In Major League Baseball, these records are essential for the team owner, front office workers and coaches to figure out strategies on the diamond or how to distribute fair pay.