PRTG Network Monitor (WIN-NAOF3C9EOP9) |
Paessler BlogConnected Time: Strategies To Put Time Back Into Our Lives And SystemsAs system administrators, IT architects and ninja network admins we understand one staple of the human experience more so than our brethren in other parts of the enterprise, time. Why You Need an IT Security Culture and How the PDCA Method Can HelpFrequent cybercrime news reports, and also surveys, show that the human factor in IT Security Management (ITSM) is often given too little consideration. Often, the weakest link in the chain are the employees of an organization and not the IT infrastructure itself. This fact leads directly to the question of “how a comprehensive IT security culture can be developed and maintained within an organization”. Some key aspects to be considered. 8 Key Considerations When Choosing a DBMSHaving a perfectly fitting database management system (DBMS) is a key component for today’s business success. The DBMS manages the interaction between your applications and the underlying database. It assures that the correct data is available for the requested user group when needed. When choosing a DBMS from the variety of concepts and vendors, you should consider the following points before making a decision. Trust, Security, Palo Alto: A PRTG Use CasePalo Alto Networks based in Santa Clara, California provides their 45,000+ customers in 150+ countries a "Next-Generation Security Platform" through their firewalls and security management tools. Palo Alto Networks is the security company maintaining trust in the digital age by helping organizations prevent cyber breaches. Connected Families: How We Are All Connected To The InternetSoftware-defined virtual machines such as VMWare and Microsoft virtual PC reformed network management in the 90's, as our hardware devices became software. Automate Your PRTG Tasks Using CLIDid you ever ask yourself what are possible tasks for PRTG Network Monitor beyond using predefined sensors? PRTG is famous for its self-explaining web interface and its intuitive handling. So, you can perform most of your tasks without taking your hands off the mouse. Moreover, PRTG offers a wide variety of additional capabilities to monitor network related stuff. One thing we will have a closer look today is using the command line interface. Sensor Story Contest - Our Last Winner: Andreas Ginther with His Smart Mailbox and other Smart Home ProjectsWe are very pleased to announce the last PRTG Sensor Contest winner: Andreas Ginther, who dealt with the topic of Smart Home and who has taken us by storm with his love of detail and excellent documentation. PRTG and Your Daily Life #1 - Ledunia, the Wi-Fi-Enabled IoT Dev Board»The Internet of Things is not a concept; it is a network, the true technology-enabled network of all networks.« – Edewede Oriwoh It’s hard to think of anything more vague than the term Internet of Things. It can mean anything from concrete trends, pieces of tech to a network of physical devices, home appliances, vehicles, and other items, embedded with software, sensors and network connectivity - which enable these objects to connect and exchange data. The Internet of Things promises a complete new era of network monitoring, where the number of things that are connected to the network and the amount of data they generate will grow exponentially. The Top 5 Causes of Sudden Network SpikesSomething happens after IT teams implement a bandwidth monitoring solution: They get inquisitive. Most bandwidth monitoring solutions make it easy for IT teams to identify alarming or sudden peaks in their network traffic by communicating the data through graphical interfaces. There are many different causes of sudden network spikes, and as a good sysadmin you should find the root cause of any unusual bandwidth usage. Connected Bodies: How Managing Our Health Has Become a Series of Disaster Recovery ProcessesAll your servers are down! Customers are blowing up your phones! Competitor's bots are making your system crash their marketing victory on Twitter! The disaster recovery plans that we thought sound are not standing up, and our SLA's with our business partners are not being met! Sound familiar? All You Need to Know About PRTG and Meltdown / SpectreThe new year began with bad IT related news. For the last week everybody has been talking about Meltdown and Spectre. What sounds like a nuclear accident or a James Bond movie in the first moment, are both major security issues exploit critical vulnerabilities in modern processors. PRTG & The Exchange Admin– Monitoring Exchange as a Business ServiceTo round off this series of articles on how PRTG can help monitor Microsoft Exchange, I thought I’d look at things from a different perspective, that of Exchange as a business service, rather than just a collection of IT components. Paessler AG Starts the Year 2018 with a New CEOChristian Twardawa, former COO, takes over the CEO role from our founder Dirk Paessler, who resigned from this position on January 1st 2018. Enabling The Cyber Hunter - “Detection After The Fact”We keep hearing about the staggering volumes of Terabyte attacks. The only way to neutralize such attacks is an distributed stateless approach combined with state of the art machine learning algorithms. Meeting Compliance - “Old Tools? Tread Carefully Or Revamp To A Higher Tier Security”The security space is filled with solutions that focus firmly on the detection side of the cyberspace continuum. Almost all of the industry is talking about cutting-edge detection and automated DDoS mechanisms. When you examine the security landscape, it's not only the things you know that are bad on your network, it's the things that you are not aware of yet that cause the damage. |
|