WhatsUp Gold
Click here for a free 30-day trial of WhatsUp Gold

For most companies, a new year means a clean slate to renew goals and focus on success. Here at Ipswitch, we started the year releasing major improvements to WhatsUp Gold with version 16.4.

Diving Deep into WhatsUp Gold 16.4

In a previous blog post, my colleague Kevin Conklin outlined the general highlights of these updates. In this post, I will take a deeper dive into each improvement and its implications for monitoring your networks.

For those of you who want a super deep dive, check out this video that provides an 11 minute technical overview of WhatsUp Gold 16.4.

SSL Certificate Monitor

If you are responsible for web servers that use HTTPS, this monitor can save you serious embarrassment and potential loss of customers and revenue. If a certificate expires on your web server, your customers will be shown a scary expiration message instead of your web page.  While the message does allow your customers to get to your website via a special link, many customers will lose trust in your website and will simply abandon the page, and might never return.

To solve this nasty problem, the SSL Certificate Monitor will alert you a number of days before a certificate expires, based on a warning time frame that you select.   A common setting for this monitor is 30 or 60 days.  Thus, if an alert is triggered, you will have plenty of time to get a new certificate and load it before the current certificate expires.  Your customers will never know.

In addition to checking for certificate expiration, the monitor also tests to see if the DNS name of the web server matches the canonical name in the certificate. This is also a frequently encountered configuration error which can cause angst for your customers.  With this monitor, you can ensure that this configuration error never happens.

File Content Monitor

In WhatsUp Gold 16.4 we added a great new tool for the IT admin’s toolbox: the file content monitor. The monitor is deceptively simple.  It scans a text file or files of your choosing looking for a string, and then alerts if it finds the string.  This opens up WhatsUp Gold to monitoring lots of things that it couldn’t before, except through custom scripting.

A common use case is to monitor the logs of custom applications. Let’s say that a custom application puts the word ‘error’ into a log text file when some problem occurs.  Using this monitor, you can be alerted when this happens.  We’ve made sure that the monitor remembers where it was in the log file between polls, so it won’t alert again on the same error.  Or, you can have the monitor read the log file from the start on each poll, which handles other logging use cases, such as when a log file is re-written on a regular interval.  This is one of those monitors that can be used in all sorts of creative ways in diverse networks.

Flow Monitor

Flow Monitor is a great plugin for WhatsUp Gold. It gives IT admins a detailed view of their network like no other part of the WhatsUp Gold platform.  We’ve made a couple of key changes to Flow Monitor in this release.

First, on the Flow Sources page, we have added better sorting and filtering. You are now able to filter sources based on DNS names and IP addresses, or any part thereof.  If you want to see the sources that have interfaces in the 192.168.1.x network, no problem.  Just type that in ‘192.168.1’. In addition, we’ve added better sorting on the sources page.  Both these improvements have been asked for by our customers, especially for those dealing with a large number of flow sources.

In addition to these interface improvements, we’ve also added two new reports: Top Endpoints, and Top Endpoint Groups.  A common use for Flow Monitor is to show which devices on your network are sending or receiving the most data.  We have reports like Top Senders and Top Receivers for this.  But we’ve never had a report that showed the devices on your network based on total traffic, both sending and receiving.  That’s what the Top Endpoints report does.  In addition, like many of our other reports, we have a version of it meant for groups of IP addresses that you define, giving you a way to make your environment more understandable.  With these two reports, you can really get at your bandwidth hogs like never before.

What’s Next

These improvements will make using monitors in WhatsUp Gold easier and more user friendly. In 2015, we identified the places WhatsUp Gold could be stronger and more useful on a day-to-day basis. This work prepared us to launch these exciting upgrades in 2016 and start the year off right.  Look for my next blog post for another deep dive into more new features.

government-monitoringWeb security consists of multiple moving parts that can move in opposite directions. As a result, actions or technologies that improve one aspect of security may weaken another. Some enhancements might end up compromising your overall Web security.

An entanglement of just this sort builds even more complexity around the issue of government monitoring. Should Web traffic be limited in how much merits encryption? Should law enforcement have “back door” access to encrypted activity? More to the point, what are the security implications of these policies or standards with respect to your department?

This concern isn’t about government traffic monitoring in general, however strong (and mixed) many people’s feelings may be about the government monitoring personal content. Your questions relating to encryption are narrower and less ideological, in a sense, because they carry profound implications for your company’s Web security.

A Double-Edged Sword

Online encryption wars are not new; as Cat Zakrzewski reports at TechCrunch, the debate goes back two decades. With so many growing more concerned about Web security, though, the issue has new urgency. In a nutshell: It is widely agreed in cybersecurity that encryption — particularly end-to-end encryption — is one of the most powerful tools in your infosec toolbox. For thieves, stolen data is a worthless jumble if they can’t read it. That’s the point of encryption.

End-to-end encryption provides a layer of protection to data over its full journey, from sender to recipient. Wherever thieves may intercept it along the way, all they can steal is gibberish. Law enforcement’s concern about this depth of encryption, however, is that anyone can use it — from terrorists to common criminals, both of whom have particularly strong reason to avoid being overheard. Moreover, new categories of malware, such as ransomware, work by encrypting the victim’s data so the blackmailer can then demand assets before decrypting it to make it usable again.

For Whom the Key Works

This problem is difficult, but not unusual: If lockboxes are available, cybercriminals can use them to protect their own nefarious secrets. The effective legal response is to then require that all lawfully sold lockboxes come with a universal passkey available to the police, who can then open them. There’s your back-door access.

But that’s where things get complicated. If a universal passkey for back-door access exists, it could potentially fall into the hands of unauthorized users — who can use it to read any encrypted message they intercept. Your personal mail, your bank’s account records, whatever they get access to.

(The NSA and its affiliates abroad can build their own encryption engines without this vulnerability, but such high-powered technology isn’t cheap — beyond the means of most criminals, terrorists and the like, of course.)

More Keys, More Endpoints

A special passkey available to law enforcement would presumably be very closely held, and not the sort of thing bad actors are likely to get their hands on by compromising an FBI clerk’s computer. But the primary concern in cybersecurity is that the software mods needed to provide a back door would make encryption less robust. This means encryption will be less effective for all uses, even the most legitimate ones.

In essence, a lock that two different keys can open is inherently easier for a burglar to pick. According to Reuters, White House cybersecurity coordinator Michael Daniel acknowledged he knew no one in the security community who agreed with him that a back door wouldn’t compromise encryption.

Crucially, this problem is independent of any concern about the governmental misuse of back-door decryption technology. Even if no government agency ever used the back door to decrypt a message, its existence makes it possible for a third party to reverse-engineer the key, or exploit a subtle bug in the backdoor functionality — thus enabling them to read the once-encrypted messages.

Encryption isn’t an absolute security protection; nothing is. But it is one of the most powerful security tools available, and your team is rightfully concerned about the risks of compromising it.

Application monitoring can help troubleshoot bandwidth bandits and other disruptions (credit: Jerry John | Flickr)

Cloud computing is a ready-made revolution for SMBs. Forget about server downtime; elastic computing and API-driven development is perfect for smaller organizations with project funding in the mere thousands of dollars.

All that agility is allowing information architects to think big — smartphone connectivity, IoT, lambda architecture — with existing app performance monitoring standards becoming more Web and socially aware.

Perfect world, right? Well, maybe a “perfectable” world. While developers are doing the elastic, agile thing — leveraging the power of pre-built tools through IFTTT or Zapier and getting Big Data tools from GitHub — they’re making assumptions about available bandwidth. They may even add Twilio to the mix so the company can SMS you in the middle of the night when their app hangs.

App Performance: ‘It’s Spinning and Spinning’

“I can’t do anything. It’s just keeps spinning,” you’re thinking. Classic Ajax loader. Users from a different era prefer freezing metaphors, but those are just as obvious, and don’t encompass today’s issues: “My email won’t send,” “My daily sales dashboard won’t load” and, now, “the whole neighborhood’s smart meters are offline.”

A new set of network demands are rounding the corner, foreshadowing a greater need for application performance monitoring: SIEM, Big Data, IoT, compliance and consumer privacy audits. It is the slow death of offline archiving. And for each, file sizes are on the rise and apps are increasingly server-enabled — often with heavy WAN demands.

Open Source, DIY and Buy-a-Bigger-Toolbox

Presented with bandwidth concerns, some support specialists (or DIY-minded developers, as that is often the SMB way) will turn to open-source tools like Cacti to see what they can learn. And they may learn a lot, but often the problem lies deeper inside an app’s environment. As one support specialist explained (known as “crankysysadmin” on Reddit), “It isn’t that easy. There are so many factors that affect performance. It gets even more tricky in a virtualized environment with shared storage and multiple operating systems and complex networking.”

Another admin in the Reddit thread agreed: In terms of app performance monitoring, he responded, “there’s no one-size-fits-all answer. What type of application are we talking? Database? SAP? Exchange? XenApp? Is it a specific workflow that is ‘slow’? What do you consider ‘fast’ for that same workflow?”

Event-Driven Heads-Up for App Hangs and Headaches

App usage spikes have many possible causes, which is precisely why a commercial app monitoring tool that is easy to use when you need it in a pinch can ultimately pay for itself. Depending on site-dependent update policies, types of applications support, regulatory environment, SLAs and cloud vendor resources, you’ll sooner or later be faced with:

  • Massive updates pushed or pulled unexpectedly.
  • Surprise bandwidth-sucking desktop apps.
  • Developer runaway apps.
  • App developer design patterns tilted toward real-time event processing.
  • Movement toward the more elastic management of in-house resources.
  • Management of bandwidth usage by cloud service providers.
  • A need to integrate configuration management with monitoring.
  • Increased support of operational intelligence, allowing for real-time event monitoring as described by Information Age.
  • Monitoring to develop application-dependent situation awareness.

The last of these, situation awareness, deserves an emphasis. Consider the impact of moving monthly reports to hourly, or a BI dashboard suddenly rolled out to distributor-reps. Situational awareness at the app level can ward off resource spikes and sags or even server downtime.

Identify What’s Mission-Critical

Whether the monitoring answer is open source or commercial depends partly on whether your apps are considered mission-critical. For some, VoIP and Exchange have been those applications. The SLA expectation for telephony, for example, is driven by the high reliability for legacy on-premises phone systems that rarely failed. SLAs for VoIP are often held to the same standard.

And what’s mission-critical is probably critical for job security. If the CEO relies on a deck hosted in Sharepoint for briefing at a major conference, and he can’t connect at the right moment — well, you may wish you had a bigger IT staff to hide behind.

CTA-BANNERS-downgrade

Related articles:

Are Your Mission-Critical Applications Starving for Bandwidth?

Noble Truth #5: Network and Application Performance Defines Your Reputation

We%20are%20UNG

Auditing network inventory can be time-consuming and tedious. It’s only amplified for organizations with an IT environment that spans across multiple locations. Making matters worse, manual inventories lead to outdated information and issues with compliance audits. But don’t just take our word for it.

In our December 8 webinar, “Effectively Manage Inventory & Configuration Changes,” we’ll hear Michael Roth of the University of North Georgia discuss how his team embraced automation by shedding
network monitoring and inventory processes across the school’s IT infrastructure.

A Lot Can Go Wrong on the Network in Under 30 Minutes

Michael is the senior systems engineer at the university. As a campus that’s spread out across northern Georgia and accommodates 16,000 students, managing the 500 systems running on the network is always a challenge. The legacy system that Michael and his team had previously used to monitor the IT infrastructure worked for a while before starting to show its age.

The system ran reports every 30 minutes. That wasn’t a problem when it was first created. With thousands more laptops and mobile devices on the network than before, the lag time in reporting was a big issue. As a result, the IT department never had an accurate time stamped vantage point of the network. With such poor insight a small problem could blow into a major outage before the IT team was even aware of it.

Painless Daily Network Audits

One of the department’s student workers had used WhatsUp Gold, our automated network monitoring system and recommended it to Michael. Once the product was installed it immediately received real-time information about the status of the network. It didn’t end there, though. Michael and his colleagues discovered new systems on the network that the legacy solution was unable to detect.

Twice a year, the school undergoes intense audits of its IP addresses. Previously, managing inventory like this took a huge amount of time and energy. With WhatsUp Gold, Michael and his team replaced a massive undertaking with a completely automated process. That’s a homerun for anyone in IT.

>> To find out how your organization can hit one out of the park, tune-in to our December 8 webcast at 2pm US ET where Michael will share his best practices in more technical detail.

web promo Related articles:

Network Bandwidth Utilization: Right Amount, Right Place & Right Time

Simplifying Network Management Tasks with LLDP  

Opposite arrows with Complicated versus Simple.. Hand drawing with chalk on blackboard. Choice conceptual image

How long does it take to realize the ROI of a given technology? If you asked that question to IT decision-makers, you’d likely get a variety of answers—everything from “it depends” to “weeks, months, or years.”

Delivering ROI for a given technology immediately is becoming more and more crucial for IT decision-makers. It’s absolutely essential that they are able to solve real problems, install easily and deliver rapid time-to-value measurements.

In order for this to accurately happen, companies must embrace both simplicity and automation. In fact, this happens to be “Truth #9” in one of our eGuide, the 9 Noble Truths of Network, Server and Application Monitoring.

On this blog we’ve been exploring each of the nine truths in detail, with the intent of helping you overcome the many challenges associated with ensuring peak performance of your network. In this instance, the means of obtaining such an efficient, automated solution is even easier than it may appear. However, there are three things that IT-decision makers must look for:

Simplicity in Noble Network Operations

It’s essential that the complexity of the IT management system is toned-down. Find a solution that provides at-a-glance insights into network operations. A solution that manages information by providing easily digestible analytics on a dashboard will enable IT decision makers to quickly see important statistics and quotes about a new technology. Likewise, they’ll be able to react faster, creating a better product and providing better customer satisfaction.

Simplicity in Network Integration

Bringing a new integrated network monitoring solution into your office should be simple and easy. It’s important that a solution not only can set itself up, but also has the ability to understand, monitor and inform IT teams about the network’s makeup, health and potential and actual problems on command.

Furthermore, the solution must utilize automation to set-up and configure important metrics within an hour. Automation gives companies the upper-hand of truly understanding their technology and how they can mold it to best help their target audience.

Simplicity in Cost

Utilizing an integrated monitoring solution that offers a device-based pricing model will easily save your company the most money. Ideally, you’ll find an affordable product with low maintenance requirements. Not only are device-based pricing models generally the least expensive, but they’re also the least complex pricing models to understand because you’re able to easily see how much you will be paying as the solution scales.

While an integrated monitoring solution is important for companies seeking to accelerate the reading of ROI for a given technology, it’s also important that you’re securing the use of a solution that provides everything that you need and nothing that you don’t.

Your users want an IT management system that doesn’t clutter their analytics dashboard. They’re looking to swiftly see what’s wrong and how to fix the problem. Besides, if they’re using functions that they have no need for, then your IT-decision makers will lose out on seeing the immediate benefits of such a solution.

To learn more about how simplicity and automation accelerate time-to-value, be sure to check out the 9 Noble Truths of Network, Server and Application Monitoring.

universal-health-services-office

As we get closer to the Ipswitch Innovate Virtual Summit – kicking off next Wednesday, October 21 – I’ll continue to offer previews of our sessions, including those to be presented by eight customers and our keynote speakers. Today, here’s a peek at the best practices story you’ll hear from Steve Rogacki, technology services manager for Universal Health Services. His talk is called “Proactive Management of Mission-critical Servers.”

Finding the Little Things on Servers Before They Get Big

As one of the largest hospital management companies in the country, Universal Health Services owns and operates 235 acute care and behavioral health facilities and surgery centers, employing more than 70,000 people. In a nutshell, that’s a lot of data to manage.

Steve Rogacki, UHS’ technical service manager, and his staff of 10 system administrators and engineers need to ensure that the company’s 150 servers have more than enough capacity to meet the daily data demands of the sprawling healthcare company. But Rogacki and his staff previously had no real-time insight into how servers were performing and had to instead sometimes react to hundreds of users calling to say they couldn’t log into the system because a server was locked up.

Now, with WhatsUp Gold, our unified network, server and application monitoring software, Rogacki will get alerts about problems such as impending disc space capacity and can have his staff proactively react to issues before they happen.

With WhatsUp Gold, we can go in and can stay ahead of all these major issues by resolving the little ones.”– Steve Rogacki, technical services manager for Universal Health Services.

Tune in to hear Rogacki discuss how real-time monitoring lets his staff keep ahead of the small problems and instead work on long-term projects they had previously neglected during Ipswitch Innovate next week.

Come see us at Ipswitch Innovate Virtual Summit

Come to Ipswitch Innovate 2015. It’s free to sign up and you’ll get three hours per day of live webcasts and a virtual exhibit hall where you can evaluate network monitoring and data transfer solutions like What’sUp Gold, WS_FTP and MOVEit. You can even navigate your way to the online Genius Bar for real-time answers to your product questions. Feeling lucky? Sign up by October 15, 2015 for your chance to win a Pebble Smartwatch. Use the promo code “PWATCH” when you register.

The Ipswitch Innovate Virtual Summit, by IT pros for IT pros. Click here to register!
The Ipswitch Innovate Virtual Summit, by IT pros for IT pros. Click here to register!
noble-truth-number-7
Avoid blamestorms with unified monitoring.

You’ve heard of “alarm storms” going off in your network. It’s when a failed component on the network chain triggers a storm of alerts for devices linked to it. Well, without unified monitoring, you better get used to the term “blamestorm,” as you’ll be pointing the guilty finger in every direction.

As IT complexity and diversity rapidly evolves, it’s important for businesses to utilize unified monitoring across all wired and wireless networks, and physical and virtual servers and applications. With more visibility, it is easier for IT teams to pinpoint, assess and fix a problem within an organization. We explore this theme in our seventh “Truth” in one of our latest eGuides, the 9 Noble Truths of Network, Server and Application Monitoring.

With that in mind, let’s take a look at the top five ways unified monitoring can help make your job easier:

1. Reduce the Amount of Time to Resolve an Issue

If your organization is utilizing multiple monitoring products, then these products typically “talk” to one another. Monitoring multiple products will involve hours, days or even weeks in order to chase down the source of the initial problem. When you monitor everything as a unified unit, the mean time to repair is slashed by 25% or more.

Additionally, unified monitoring enables the development of a “common language” across network and system specialties. This makes it easier for IT teams because then everyone has a real-time understanding of the IT infrastructure and they are more able to support proactive identification of root causes, and deploy the resources needed.

2. Reduce the Cost Spent on Monitoring Solutions

If you’re not a Fortune 100 company (and even if you are), you’re probably not looking to spend thousands or even millions monitoring your company’s network. However, you do have to buy a license based upon the number of devices you need to monitor, regardless of the number of interfaces, volumes or applications per device. By centralizing your monitoring system, your company will drastically cut costs.

This money is then able to go towards other needs within the IT department so that you can focus on building a better team—and less on hardware.

3. Reduce the Risk of a Data Breach

If you’re able to monitor all devices at once, then you’re more apt to see when trouble is coming your way. If all IT operations are under one interface, then it will be easier for you to be proactive and solve the problem before it breaches your system. This will put both your staff and clients at ease.

4. Reduce Your Network’s Downtime

A unified system can identify a “traffic jam” within a system by gathering information from every point of the network – including virtual, physical and private cloud environments. System outages are cut by 20% when utilizing unified monitoring.

5. Reduce the Impact of Negative Revenue

Since you have reduced downtime, the availability of your services have been improved thus positively impacting your company’s revenue.

 

Unified monitoring basically helps your company function more smoothly.

It’s time to ask the question: Is your network monitoring software Network Admin Friendly? You may already have software in place to monitor your network, applications and servers, but the question remains, is that software actually working for youClick here to answer these five easy questions to see for yourself.

ManageYOURNetwork infographic_Matt W_aug 2015

And if you’d like to take a deeper dive into these questions about network management software, check out our recent webinar. We delve even deeper into the topic, and provide some interesting case studies on people who have made our own network management software, WhatsUp Gold, work for them.

WhatsUp Gold 16.3 dashboard
New user interface with enhanced “look and feel” allows for dynamic resizing and simplified navigation. Click on the image to learn what else is new in Version 16.3.

Today we are excited to announce the release of WhatsUp Gold 16.3 with new features that improve the power and user experience of our network and system monitoring software for IT teams.  The release includes an improved user experience, faster installation, the industry’s first and only native support for Cisco NetFlow-Lite, expanded Microsoft application performance monitoring, and top customer requests for increasing productivity and monitoring flexibility.

New features in Ipswitch WhatsUp Gold 16.3 include:

  • Improved User Experience: A new user interface greatly enhances the user experience and offers simplified navigation
  • Faster and Easier Software Installation and Network Discovery: A new software installer and network discovery wizard reduces installation and deployment steps by fifty percent
  • Simple, Customer-Friendly Licensing: New unrestricted licensing option expands the award-winning Ipswitch device-based licensing model that provides IT Teams total network visibility without compromise. Users have the freedom to monitor full devices without vendor-imposed restrictions by elements, interfaces, or monitors that create costly surprises at renewal time.
  • First and Only Native Support for Cisco® NetFlow-Lite: Fine-grained support for Cisco Netflow-Lite gives IT teams better traffic flow visibility, improved network planning and simplified troubleshooting and eliminates the need for a third party aggregator to understand and analyze network traffic flow.
  • Powerful monitoring for Microsoft Applications: The latest version of WhatsUp Gold provides expanded application performance monitoring (APM) support for Microsoft® Exchange, SharePoint®, Dynamics, Lync®, SQL Server®, Internet Information Services (IIS), Windows®, Active Directory® and Hyper-V®. With version 16.3, IT teams can leverage Microsoft expert knowledge via pre-defined profiles to monitor application performance and dependencies. They can easily get alerts, isolate the root cause of performance problems and fix problems quickly.
  • Increased Productivity: WhatsUp Gold 16.3 provides IT teams with one-click device maintenance mode and granular control of blackout schedules and alerts. The latest version also provides smart action policies when devices are down. To further increase productivity and shorten time-to-value, an updated discovery wizard ensures faster and more streamlined set up and discovery.
  • Enhanced Monitoring Flexibility: Version 16.3 gives operators expanded customization options and encryption support for Secure Shell (SSH) monitoring. Operators also have detailed control of Windows mount points.

WhatsUp Gold 16.3 delivers greater visibility into network and application performance and quickly identifies issues to reduce troubleshooting time. This allows IT teams to efficiently monitor and manage network and system performance to meet the demands of a more mobile and connected workforce.

>> To learn more about Ipswitch WhatsUp Gold v16.3 please visit the “What’s New” page on our website.

The phrase “quick and dirty” is popular in the business world, but in some ways it’s really kind of a misnomer. Take for example an IT department that is stuck in the mud of network, applications and server performance problems. Things are certainly dirty, but they are definitely not quick.

In this sense, being stuck in the mud isn’t just about slow or intermittent performance issues; it’s about IT departments making the slow trudge through an entire suite of solutions hoping to discover the root cause; it’s about users suffering lapses in productivity and it’s about SLAs that go unmet.   get out of the mud

If you want to get unstuck—and we hope that you do—you can take your first step out by checking out one of our latest eGuides, Get Out of the Mud of Sinking IT and Business Productivity. This informative eGuide will show you how to leverage dependency-aware mapping to create a unified dashboard of your network and application infrastructure and improve fault isolation and resolution speeds for increased business productivity.

The tools and techniques covered are affordable and easy to deploy—meaning you’ll never feel stuck in the mud again. Some of the challenges discussed in the eGuide include:

Low IT Productivity

If you can’t identify the fault that’s causing your performance problems, how can you fix it? Answer: you can’t. Disparate, open source, or inherited monitoring solutions often make it unnecessarily complicated for you to identify root cause. To do that, you’ll need a solution with dependency awareness and rapid discovery and mapping to find that root cause—and reclaim your lost time. Otherwise, as we note in the eGuide, you’ll end up taking this route:

The alternative is to manually and painstakingly map your entire network— and create each and every dependency individually (numbering hundreds or thousands of devices)—which can result in your team losing days and weeks of valuable time. That’s time that could have been spent on more productive tasks that add value to your organization and enhance its core competencies.

Low User Satisfaction

An unhappy user is an unproductive user—and unproductive users tend to voice their complaints. First to you, then to management. Your users aren’t interested in your excuses. All they ask for is an available network that runs smoothly, giving them the ability to work efficiently so that they can deal with their own job tasks—instead of worrying about yours.

In the eGuide, we explain how to keep your users happy by anticipating and fixing network problems before they happen, and how to find a fast, easy way to isolate issues—and keep that network running.

Budget Limits

Expectations for network performance (and those who manage it) have skyrocketed in recent years, while budgets have remained relatively flat. This becomes extremely problematic when companies decide to go with vendors who employ per-port pricing model. In the eGuide, we explain why it’s more cost-effective to leverage a per-device pricing model, and that by doing so, you won’t end up paying for expensive upgrades after evaluation or when it’s time to renew your license.

So if you’re looking for a “quick and clean” solution to your network performance problems, then be sure to check out the latest eGuide here:

Get Out of the Mud of Sinking IT and Business Productivity >>>

Over the past few weeks we’ve taking a sneak peak at our latest white paper “9 Noble Truths of Network, Server and Application Monitoring.” Today, we explore the final three truths in more detail, starting with #7.

Truth #7: Unified monitoring is essential across wired and wireless networks, physical and virtual servers, and applications.

Get network visibility through a single lens
Get network visibility through a single lens

As business relies more and more on IT to achieve success, a glitch in one area can have a ripple effect across the entire organization. No matter where the problem lies, you must be able to conclusively identify its root cause and assign responsibility for resolving it. To do this, you must have complete visibility across the whole infrastructure.  A unified monitoring solution across wired and wireless networks, physical and virtual servers and applications is essential as IT teams evolve and handle escalating IT complexity.

Truth #8: Automatic discovery and continuous dependency mapping saves time and enables you to find and fix problems faster.

Today’s networks are highly dynamic with changes constantly happening – new application deployments, new infrastructure coming online, office reallocations, mergers/ acquisitions, new dependencies among components, and so on. The ability to see and understand the relationship between devices is critical to managing your infrastructure, and to quickly be able to identify the root cause of problems. How can you respond rapidly to a problem when you’re chasing down false alarms? Automation ensures teams get the most meaningful alerts about the right devices at the right time. When your dependency maps are always up-to-date, your infrastructure reliability improves.

Truth #9: Simplicity and automation accelerate time-to-value

In a world of increasing complexity, IT teams need tools that solve real problems, install easily, don’t require teams of experts to configure, and deliver rapid time-to-value and ROI. As the pressure continues to mount on IT to meet availability targets, automation becomes essential as a means to understand, monitor and inform teams about the network’s makeup and potential for problems. Yet, such a tool can be powerful and flexible without being costly or complex to deploy and manage. IT teams want tools that just work – out of the box – with no fuss. Ipswitch 9 Noble Truths

Be sure to read Part 1 and Part 2 of our blog series and check back soon as we will be discussing the solutions to the 9 Noble Truths. In the meantime, you can download the white paper and learn:

  • – The nine truths for deploying network, server and application monitoring
  • – How IT teams can meet the need to thrive while doing more with less
  • – How to find and fix problems before users are impacted

In this blog series based on our white paper, “9 Noble Truths of Network, Server and Application Monitoring,” we’ve been delving into the problems plaguing IT and describe individual paths for each solution. Here, we continue with the next three 9 Noble Truths.

ThinkstockPhotos-178795550
No IT team wants their network to hit a stop light

Truth #4: Downtime is not an option 

You can’t afford downtime in today’s non-stop world. Aberdeen Group’s research found that between June 2010 and February 2012 the cost per hour of downtime increased by 38%. As organizations continue to automate and rely on the network to get business done, the increase cost of downtime will only continue to rise. Every type of company relies on an application on a network to complete some aspect of its work process—and a stop there means a stop to business.

Truth #5: Network and application performance defines your reputation

Ipswitch 9 Noble Truths
7 Most Common Root Causes of Network Performance Issues

From the perspective of customers, partners and employees, your network is your business and your reputation is on the line every time it is accessed. Major incidents like an outage or a security breach have the power to impact reputation – and according to a recent study by IBM and Forbes, reputational damage lasts far beyond recovery times. There are no second chances when it comes to the deployment of new IT infrastructure and services. “Organizations that have capabilities for measuring quality of end-user experience are twice as likely as other companies to improve their brand reputation,” said Hyoun Park, Research Analyst, Aberdeen Group.

Truth #6: You must find and fix problems before users are impacted

IT teams shouldn’t find out that users are having problems from the helpdesk. You must be able to proactively identify and resolve issues before users report service degradations. Proactivity comes in three steps, and will be discussed in the next few weeks.

Be sure to read Part 1 of our blog series and check back soon for another peek at our 9 Noble Truths. In the meantime, you can download the white paper and learn:

  • The nine truths for deploying network, server and application monitoring
  • How IT teams can meet the need to thrive while doing more with less
  • How to find and fix problems before users are impacted