sFlow vs. NetFlow: Which is Better?
Two key tools that network admins use for monitoring are NetFlow and sFlow. In this article, we'll compare both, and see if they can work together.
Two key tools that network admins use for monitoring are NetFlow and sFlow. In this article, we'll compare both, and see if they can work together.
A multinational office furniture and design company came to us with a problem. Their Internet service costs were skyrocketing and they didn't know why. They had over 60 flow sources across North America and Asia. And they had little to no visibility into their network traffic and bandwidth utilization.
We got to chat with Chris Payne about what exactly Advanced Cyber Solutions does as a company and how they are helping support and sell our solutions.
The team that leads the enterprise network infrastructure services division at the largest school system in Georgia gets graded on network performance and high availability. With 140 schools in the district to support, earning a passing grade is no easy feat.
Understanding exactly what’s happening on your network in real-time through network visualization and analysis can give you the insight to shrink big problems into little, manageable ones.
Network discovery is, not surprisingly, the process of finding and identifying every device, server and system on your network. Mastering IT best practices around network discovery will greatly improve how your map and monitor your IT infrastructure.
Wouldn't it be great if you could get an automatic alert every time something in your house or car broke, like when a spark plug or fuse failed, or when a light bulb went out? That way you could fix those problems before they caused you any trouble... If only. For most of us, the prospect of such a smart home is still a distant glimmer in the future, but for IT teams (and others) working in a modern enterprise, you can get automatic notifications when parts of your infrastructure fail, and you can fix those failures before they cause problems. How? With the IT swiss army knife/ticketing system known as ServiceNow.
Providing fast access to applications and data while protecting digital assets are the two biggest challenges faced by network administrators. Performance and security represent the two-pronged mission that administrators find themselves facing every day.
Many organizations that rely on Amazon Web Services (AWS) aren't doing the best job tracking their AWS resource usage and spending– they just pay the monthly bill from Amazon. Unless that bill significantly increases, they have no incentive to determine if they’re really using all those resources or if they’re being accurately billed. But they should be— many companies pay an average of 36% more for cloud services than they need to, according to one report.
Steel is a commodity so Klein Steel knows they need to be unique to stand out in a crowded market. So they created Klein Steel Service’s Advanced Center of Excellence facility to accomplish just that.
Your IT infrastructure is ready to make the big move—from on-premises to the public cloud. Or perhaps you’re already in the cloud, but it’s time for a change to a new platform provider.
When troubleshooting problems or investigating potential security breaches, the Windows event log is a great place to start. Windows provides an extensive list of various event logs grouped by a provider with a sometimes staggering number of events recorded within. With all of these events being recorded, it's hard to figure out what's going on. One way to search event logs across not one but hundreds of servers at once is with PowerShell.
Last month, we released WhatsUp Gold 2019.1, and with it, the addition of a powerful REST API that lets you easily integrate other systems or your own scripts with WUG.
With the new REST API, you can now use an extensive range of REST API calls to get data from WhatsUp Gold from other systems, or input data to WhatsUp Gold or have other systems make changes. The result is a huge range of automation use cases that will help IT teams be faster and more efficient. Example use cases include the ability to automatically put devices in maintenance mode before making changes, the ability to add or remove devices and monitors automatically, and more.Amazon Web Services (AWS) have simply become a fact of life for most IT organizations. The benefits of outsourcing networking to Amazon’s cloud are simply too obvious to ignore or to not take advantage of.
In many jurisdictions, there is a legislative or accounting requirement to store data for a minimum of five years. Easier said than done. That's why multiple data backups are necessary.
Despite being an essential piece of the Sysadmin toolbox, Network performance management (NPM) can be a bit of a mystery for many IT professionals.
WhatsUp Gold can monitor every single part of your network to give you a wealth of information on status, performance, traffic and thousands of other metrics. And now WhatsUp Gold can share that information directly with any of your systems thanks to our new REST API.
It’s 2:00 a.m. in the United States: Can your employees and customers in Europe and Asia access the applications running in your Microsoft Azure cloud? If you’re not sure on a 24x7 basis what the status is of your Azure servers and applications, it’s time to invest in a third-party monitoring tool.
If you are reading this, you are likely interested in or already utilize cloud solutions. Both Azure and AWS (Amazon Web Services) offer a variety of infrastructure as a service (IaaS), platform as a service (PaaS) and software as a service (SaaS) offerings. Selection between the two, with AWS the dominant market leader, is typically based on business requirements and online research or direct referrals (some of your contacts recommend a solution based on pricing, uptime or other). I could rehash vendor websites, favorable reviews, and other somewhat biased materials to prove the headline but, as always, I prefer to go my own route, bringing my own biases to the fore.
One of the more disheartening aspects of log collection within the Windows Operating system are the limited number of out of the box events related to security. It is often desirable to capture any unknown or malicious running processes, capture the source process for outbound connections, identify modifications to files and the registry, and to capture command and PowerShell commands that are run on a particular endpoint. Luckily for systems administrators, Microsoft provides a great tool for this type of log capture within the SysInternals suite called system monitor, or Sysmon.
Get our latest blog posts delivered in a monthly email.