With this latest release the Ipswitch WhatsUp Gold team is proud to arm the Network Admins and IT Managers of the world with the fastest, most intuitive, and most scalable version of our award-winning Network Management software.
Looking for improved pagination capabilities on reports so you’re armed with information concerning your network faster?
WUG 14.3 has it.
Did you ask for new pre-configured views for enhanced out-of-the-box operation and rapid time to value?
We heard you. WUG 14.3 has it.
WUG 14.3 also boasts:
The ability to easily copy and replicate existing monitoring settings to new devices; and consolidated report views on all monitors for a device, or, for all devices per monitor.
More Scalability allowing multiple changes to database storage, optimization techniques and querying leading to marked performance improvements; also added support for standard SQL clustering
WhatsVirtual 2.0 – which, when purchase, is fully integrated into WhatsUp Gold’s Alert Center, has seen a fair share of improved capabilities as well, including:
vCenter, which discovers, monitors and controls all virtual resources through vCenter to offer complete accuracy and reliability.
vMotion, which monitors live migrations as VMs move across physical servers to ensure a complete, accurate mapping of physical server relations at all times, including historical information and reports combined with powerful alerting capabilities.
High Availability which gives complete access to historical information and reports, combined with powerful alerting capabilities to track VMs as they are automatically restarted or moved to other physical servers due to hardware or operating system failures.
Check out what John Shiells, the senior network analyst of Nucleus Information Service, Inc. had to say about WhatsVitural’s improvements:
“We are very impressed with the outstanding monitoring and reporting capabilities of WhatsVirtual 2.0, as well as the detailed overview of each host server, which allows us to quickly analyze performance and resource issues,” said Shiells. “We also find that viewing and reporting on historical log information for vMotion and High Availability in the same console is a huge time saver. The only time we use vCenter now is to fix a problem; everything else we can see and control with WhatsUp Gold,” Shiells said.
To find out more about WhatsUp Gold 14.3 and WhatsVirual’s enhanced capabilities – as well as improvements made to the WhatsUp Gold Flow Monitor visit our website!
We’ve all been to the company meeting where tons of sports metaphors have been thrown about. From the in-depth analysis of how the company is just like the Patriots, with the CEO being Tom Brady, all the way to the simple comparison of your department being just like the Celtics starting five.
I always wondered if Doc Rivers, during a time out, explained a play and used the analogy of Kevin Garnett as the VP of Marketing, or even better something like this:
“Rajon, you need to protect the ball when passing, don’t throw it into traffic. Think like Ipswitch’s safe and secure file transfer. You know, using 256-bit AES encryption …”
You get the idea.
So, what happens when sports and a common business issue like data security have a nice pick and roll and drive to the hoop for two?
Bill Brenner (Senior Editor at CSOonline/Magazine/IDG Enterprise) has an interesting Q&A with The Boston Celtics VP of Technology, Jay Wessel. Some noteworthy stuff regarding security, Apple’s MacBook Pro, Exchange-supported iPhones, and some cloud-based services.
Security stories are always interesting, but it’s the goose bump evoking fallout that’s most fascinating – especially when it’s a hacking story. In this instance, anyone with an iTunes account could be at risk.
Zee, Editor in Chief of The Next Web reported that an app developer, Thuat Nguyen, managed to hack into the accounts of iTunes users and purchase his own apps, positioning himself at the top of the iTunes charts.
Zee goes on to say that “as the story has developed, the problem has grown far more serious than initially thought – not just that one particular developer and his apps – the Apple App store is filled with App Farms being used to steal.”
Here are a few facts:
A number of iTunes accounts have been hacked and not just in the US, but worldwide.
These hacked accounts have been used to purchase apps.
iTunes users have reported anywhere between $100-$1,400 spent using their accounts.
This seems to have been happening over the course of the last 4 weeks, although ‘MacRumors’ shows hacking on some level dating back to 2009.
Apple is aware of this and is working on it.
Watching the story unfold has to be scary for anyone with an iTunes account. Pretty much everyone I know has one. Check out the article – and let us know if this happened to you.
When interviewing job candidates, I’m always on the lookout for dedicated, motivated, passionate people that relish in rolling up their sleeves and doing whatever it takes to get the job done. Why? Because a little bit of chutzpah goes a long way towards being a successful and productive employee.
But can employees “going above and beyond” backfire and result in severe damage to a company?
Unfortunately, yes, they can.
In his guest blog post on LastWatchdog, Gary Shottes, President of Ipswitch File Transfer, describes an example of how hard-working employees are causing new security and legal liability implications that organizations need to carefully consider when deciding what tools to provide people with.
“Highly-motivated workers are willing to do whatever it takes to get the job done, with or without IT. Employees, whose job requires them to send information to colleagues, partners, vendors or customers around the globe, have literally thousands of file transfer options.
If IT fails to provide employees with a fast and easy way to share information, they will take matters into their own hands, even if that means using technology that’s not sanctioned by IT. They may use a personal webmail account, smartphones, USB drive, or even transfer data via Facebook and LinkedIn.”
Fortunately, there are some great tools out there to arm employees with a quick, easy-to-use and secure way to share information with other people, both inside and outside the company — While at the same time provide the company with the critical visibility, management and enforcement it needs to protect sensitive and confidential information. This is one situation where it makes a lot of sense to lead the horse to water & make it drink.
MOVEit Crypto, the encryption component used to secure data and settings in MOVEit DMZ and MOVEit Central in mission-critical, Internet-exposed applications, has been revalidated under FIPS 140-2 and has been issued certificate #1363. This certificate should be available on the Cryptographic Module Validation Program (CMVP)’s website (nist.gov) in 1-2 weeks.
The changes in MOVEit Crypto that required the revalidation were mainly related to the introduction of “SHA-2” hashes such as as SHA-256. As you may already be aware, use of unkeyed SHA-1 hashes will be disallowed in U.S. government applications by the end of the year. (Weaker hashes such as MD5 and non-cryptographic quality integrity checks such as CRC are already disallowed.) Fortunately, existing MOVEit products make use of keyed SHA-1 hashes (not the unkeyed hashes that will soon be disallowed), so use of existing MOVEit products with the older version of MOVEit Crypto will be allowed in U.S. government applications well beyond the end of the year.
“…if you are using external cloud resources, look at how the data and any intellectual property invested in the processing engines employed to manipulate data can be moved to other third party cloud providers, or back into the enterprise, if you need to do that. You could call this ‘Cloud Escrow’.”
This is exactly the benefit you enjoy today by selecting either a MOVEit DMZ on-premise or MOVEit DMZ Hosted Services solution. We can migrate your data into our SaaS environment, we can migrate your data into your private data center. It’s the same application but you choose what deployment model is best for your business.
Have you heard about the Russian Spies that got busted recently for basically using for security what we get as prizes in our Boo Berry Cereal. Invisible ink pens? Really? What’s next? Dr. No using Mad Libs and carrier pigeons to transfer data? For you spies out there, let this be a lesson in security: