Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Why is Network Monitoring and Network Log Management So Crucial?

Without Network Monitoring, there is no good way to get a real-time view of your connected environment. But with Network Monitoring reports, you can look backwards to spot problems and trends. Just as vital are logs that deepen this rear-view mirror look, as they contain all the data for all the elements you are monitoring.

Higher Education and the Persnickety Network: How Monitoring Comes to the Rescue

Colleges and universities face immense IT challenges. The end user base is regularly overturning with students coming and going. And residential students are just part of the problem. Increasingly, schools support extensive distance learning, which only gained ground thanks to COVID. Now that remote work and distance learning are the new mandates, there are even more difficult challenges for Higher Education IT to deal with.

What is Network Bandwidth? How to Measure and Optimize Bandwidth for Fast, Smooth Traffic Flows

Many think they know what network bandwidth is but conflate performance with capacity. This blog, among other things, will end that confusion. And for true IT experts, we’ll dive deep into the whys and wherefores of network bandwidth monitoring and optimization.

K-12 and Network Monitoring: Solving IT Mysteries, Meeting Challenges

To say that K-12 school systems have challenges is an understatement. COVID forced schools to make a dramatic turn towards remote learning, which meant the network was anything but insular, forcing IT to efficiently support thousands of new remote endpoints. That is on top of other K-12 network challenges. Issue number one: tight budgets. Most school systems are tight for cash, especially after the financial stresses of COVID and all the millions spent on PPE.

Looming 2022 (and Beyond) Network Security Threats

Every year hackers grow in numbers, aggressiveness, organization, and sophistication. And every year there are new attack types and new areas of IT infrastructure that cybercriminals target. 2022 is no different. We are about a third of the way in already and IT pros and security specialists already have their hands full with new attacks and new issues.

Network Monitoring Safety Checklist-5 Steps to Take

Network monitoring is a vital part of your security architecture and layered security portfolio. Step one in your network monitoring safety checklist is making sure you have network monitoring in the first place. The rest of our steps assume you have network monitoring and lay out five ways to optimize its value.

How Network Monitoring Defuses Hacker Bombs

You know by now that hackers literally never sleep. Chances are your network has been hit before and absolutely will be hit again. Hackers invent new techniques every day and tweak existing ones, many of which are automated—which is why we can say that hackers literally never sleep. Hackers either attack your network directly or attack your infrastructure through your network. Either way, the network itself is your first line of defense.

Network Alerts-Monitoring and Notifications

When it comes to IT, you can’t do anything with an asset you can’t see. When it comes to your networking, monitoring offers the eyeballs to know what is going on. But IT and network pros don’t spend all day staring at a dashboard waiting for something to happen. Like your local police department, they rely on notifications of trouble. Instead of 911 calls, IT depends on network alerts.

WhatsUp Gold Lesson: How Do I Configure a Device to Monitor My Voice over IP (VoIP) SLA?

WhatsUp Gold provides specialized Voice over Internet Protocol (VoIP) Service Level Agreement (SLA) monitoring necessary for tracking Quality of Service (QoS) and SLA metrics for your network of deployed VoIP devices (telephones, conference room devices and more). After you discover and configure devices for VoIP monitoring, you can view results and graphs on the WhatsUp Gold Custom Performance Monitors dashboard.

Advanced Network Traffic Analysis and Enhanced Security in the New, Easier-to-Use-Than-Ever WhatsUp Gold 2022.0

Part of our job here at Progress is to not only look at the challenges our customers are currently facing, but also to look at the technology landscape in general and consider the challenges they’re going to be facing. We don’t have a crystal ball, of course, but there are a plenty of trends that are obvious to even the most casual observer. Security has always been important, but the last year has made it clear exactly how important it is for every organization with a network.