Ipswitch Blog

How a Fast-Food Franchise Closed the Lid on Pandora’s Box

| August 7, 2013 | Application Monitoring, Network Monitoring, Tips & Tricks


Ipswitch customer engagement engineers and members of our WUGspace community have been sharing their stories from the IT front lines. These brief vignettes cover a network-related problem that was solved using one or more of our products.

These stories aren’t meant to be commercials (we have plenty of room elsewhere on our website for that) but more of an insider view into the day to day challenges faced by IT pros and how they can make their jobs easier to do.  

Today’s edition stems from an engagement with a fast food franchise where our folks came to help with a network Internet bandwidth issue.

For those of you who are WUGspace community members, share your own story from the front lines and immediately earn 100 WUGspace points and a $25 gift card. If you aren’t a member, we’d love to have you join in the dialogue.


True Stories from the Front Lines of Network Performance Monitoring: How a Fast-Food Franchise Closed the Lid on Pandora’s Box

Pandora: "she who sends up gifts". (and serves up music)
Pandora: “she who sends up gifts” (and music).

We recently worked with folks from the corporate office of a national fast-food franchise who were very concerned over their Internet bandwidth costs.  They were considering purchasing additional bandwidth to keep up with demand. 

They came to Ipswitch to help understand the source of their growing internet bandwidth consumption so they could address the issue and gauge how to solve it.

Using our Flow Monitor software, we were able to identify the source of the problem in minutes. The culprits were users streaming Pandora from the desks.

Turns out a little satellite radio can really chew into the bandwidth that others need in order to do their jobs. If the franchise had bought more bandwidth they’d be doing so in order to support an unauthorized application. 

Using Flow Monitor, they were able to enforce bandwidth usage policies and detect the use of unauthorized applications – and lowered the bill from the ISP. 


By the way, we’re music fans.

Just wanted to put that out there in case we were giving the wrong impression.




Preventing Alarm Storms

Preventing Alarm Storms from Striking Your Network and Distracting You

Implementing Compliance for Data Privacy in Regulated Industries

Free Webinar: Implementing Compliance for Data Privacy in Regulated Industries

Leave a Reply

Your email address will not be published. Required fields are marked *

Dave Seuss

This post was written by Dave Seuss

Dave Seuss is a Senior Content Marketing Manager at Ipswitch, focused on engaging with customers and other IT pros through social media and the Ipswitch Blog. Although Dave is more likely to break something than fix it, he’s close friends with IT pros who keep him honest. Dave has worked in high-tech for a few decades at companies specializing in security, network management and Internet telephony. Prior to Ipswitch, Dave held corporate communications roles at RSA, The Security Division of EMC, Core Security, iBasis and a handful of Boston-area PR agencies. Outside of work Dave is a gamer, avid photographer, and proud uncle.