by Cecilia Obas | Feb 7, 2019 | Alerting, CPU Utilization, Cyber security, Dashboard, Discovery, Mapping, Network Configuration Management, Network Monitoring, Network Traffic Analysis, Reporting, Secure File Transfer, Security, Traffic Analysis
Every device, OS and application in your IT environment generates a record of activities in the form of log files. These audit trails of activity provide valuable information when investigating security breaches and when submitting regulation compliance reports....
by Cecilia Obas | Jan 3, 2019 | Alerting, CPU Utilization, Discovery, Faster Troubleshooting, Mapping, Network Monitoring, Network Traffic Analysis, Performance Monitoring, Reporting, Traffic Analysis, Wireless Monitoring
Starting January 1, 2019 AlertFox and associated services will no longer function as we sunset this Ipswitch product. AlertFox has been a workhorse for hundreds of companies over the years helping them with website uptime and performance monitoring. So it is...
by Cecilia Obas | Dec 16, 2018 | Alerting, Discovery, Network Configuration Management, Network Monitoring, Network Traffic Analysis, Reporting, Security, Traffic Analysis
Outages of Amazon Web Services’ Simple Storage Service (S3) happen from time to time, which is exactly why you need a business recovery strategy. Your business relies on your data to be available when and where you want it. So what would be your business strategy if...
by Cecilia Obas | Nov 22, 2018 | Encryption, Network Monitoring, Network Traffic Analysis, Reporting, Secure File Transfer, Security, Traffic Analysis
It’s a given that users with access to your MFT solution have permission to use it and know exactly what they are allowed to do with it. But maybe it shouldn’t be. Security policies change regularly due to internal organizational evolution as well as new external...
by Cecilia Obas | Nov 4, 2018 | Alerting, Encryption, Mapping, Network Monitoring, Network Traffic Analysis, Performance Monitoring, Secure File Transfer, Security
You likely already realize that file transfers using the file transfer protocol (FTP) expose your sensitive data to high risks. Along the file-sharing transfer journey, there’s a lot that can go wrong: Personal data stored in files is often left unencrypted....
by Cecilia Obas | Sep 23, 2018 | Alerting, Cyber security, Data Security, Encryption, Mapping, Network Configuration Management, Network Monitoring, Network Traffic Analysis, Performance Monitoring, Reporting, Security, Traffic Analysis, Wireless Monitoring
Nearly a million servers around the world still run the unsecure legacy FTP protocol and are actually configured for ‘anonymous’ access. Not good. The file transfer protocol (FTP) utilized by your end users could be the biggest threat to your company’s proprietary...