Skip navigation

With this release we have substantially improved the integration between IPAM and UDT making it much easier to find and fix IP conflicts


With the new releases of IPAM v4.3 you can now find and fix IP conflicts in two clicks using these new capabilities:

 

IP Conflict Detection Resource

  • Detects IP address conflicts and organizes them by subnet
  • Provides troubleshooting details                                          

IP Conflict Troubleshooting Resource

  • Provides deeper troubleshooting information on ports, users, and wireless (using UDT integration)
  • Provides recommendations for how to resolve the IP address conflicts
  • Ability to remotely quarantine a device by shutting down a port (using UDT integration)

 

Download is on your customer portal or as eval for those who want to try & see. More details and demo in this post.

 

If you:

  • Own one or more of NPM, SAM, LEM, Kiwi, or another SIEM tool
  • Have 60-90 minutes in November or December
  • Want 2000 thwack points
  • Want to tell us about how you use your log monitoring tools for security and/or compliance tasks (what you love/hate, what you need more of, your dream world and your reality)

 

Sign up here to participate in upcoming research!

It's my pleasure to announce the release of NTA v4.1.  This release makes a number of key improvements, including:

  • Improved automatic sampling, particularly for Juniper gear.
  • Manual sampling for devices that don't properly report their sampling rate.
  • UDT integration so you can find out the user name and connected switch port for a top talker in seconds.
  • Improved historical application update speed (up to 7x) in certain circumstances.
  • FSDB size forecast and other details available in the NTA Settings page.
  • 8-bit ToS support; properly mapping packets with explicit congestion bits set to the expected QOS category.
  • Support for drag and drop resources.
  • Bug fixes, of course.

 

For more details and screenshots check out the RC post or grab the new version immediately.  It's available now in your customer portal!

Readers choice and winner of the “Best” Risk Policy Management Product of 2014 is - SolarWinds® Network Configuration Manager (NCM)    Award Image.png

(Read award announcement here)


“I think NCM is an invaluable tool and I don’t know how we could really operate without it.” says Doug Hull in ahttp://www.solarwinds.com/resources/videos/got-regulations-detect-non-compliant-config-changes-with-ncm.htmlrecent interview. “It’s particularly good in a regulatory environment where you need to have a strong control over changes. For any kind of regulated environment, NCM is a very useful tool.”

 

Rise in data breaches and other cybercrimes has made the role of security polices & controls gain more prominence in overall network management. Administrators face many challenges trying to implement and manage these policies. The reason being, dynamic and growing networks of today comprise of numerous heterogeneous devices geographically spread over many locations. Administrators spend loads of time and effort to ensure that the required network security policies are in place. Most often these policies get implemented but then no regular controls or monitoring exists to ensure continuous compliance. The truth is that administrators lack the tools to track devices and changes applied to device configurations/defined policies.

 

Security policies define the measures to be taken to protect information assets. Change monitoring and compliance assessments ensure that the controls defined by the policy are enforced and in place. Policy defines standards like SOX, HIPPA, PCI DSS, DISA STIG, NIST, etc. Each standard has a specified set of objectives and controls are the actions taken to achieve the standard. For example, PCI DSS was designed to protect card holder data. One of the objectives specified by PCI DSS is - routers shall prohibit unauthorized access using strong passwords.  The action taken to achieve this objective - configure routers to require user login passwords of 8 characters or more consisting of a mix of alpha and numeric characters.

 

Monitoring ensures policy controls remain enforced and don’t drift.  Compliance assessment verifies controls are in place and that they remain true to the policy. For example, if a router does not have a strong password (according to specified controls) then it does not conform to the policy.

The role of compliance monitoring and assessment:

  • Helps provide a more secure environment for your organization
  • Improves availability of critical IT infrastructure by reducing downtime due to human errors
  • Introduces accountability and audit ability with role based access control
  • Speeds up remediation by allowing changes to be applied to multiple nodes that are in violation simultaneously
  • Improves admin productivity by eliminating manual compliance checks
  • Reduces admin work responding to “data calls” about vulnerabilities

 

Continuous monitoring on the other hand, replaces point-in-time audits with a continuous view of the state of the network. The advantages are:

  • Timely awareness of real-time vulnerabilitiesfaster security event detection
  • Ability to keep up with the latest compliance requirements
  • Increased visibility into current  device configurations
  • Visibility into compliance progress
  • Automated compliance reports


How does NCM help ensure policy compliance?


Compliance policies and controls can be implemented, however to enforce them, you need automation. NCM does not define the policy, but helps network admins accurately and consistently implement network security controls via device configuration settings, monitors them for unwanted change, and verifies if they comply with the baseline policy. In a broad manner NCM helps:

  • Ensure that controls for network devices are consistently implemented
  • Ensure device configuration changes are approved before implemented
  • Monitor configurations for unwanted/unapproved changes
  • Assess configurations for compliance
  • Rollback non-compliant configurations to remediate issues and reduce downtime

The price of non-conformance to policy controls is the likely presence of numerous vulnerabilities which can put networks/businesses at risk. Therefore, it’s mandatory for organizations to not only ensure daily compliance, but also continuously monitor for adherence to these policies. Choose a tool that saves loads of time and gives you visibility into compliance management and adherence across the entire network.

 

NCM is a part of a larger suite of SolarWinds products that improve securitySolarWinds Log & Event Manager (LEM), SolarWinds User Device Tracker (UDT), Firewall Security Manager (FSM).


DanielleH

[Survey] State of VoIP

Posted by DanielleH Administrator Nov 12, 2014

When it comes to VoIP, there’s plenty of good, bad and ugly. We’d like to hear about your experiences implementing and managing VoIP for your organization. Please click here to take our short 2-minute survey. We ask about a few of the nitty-gritty details, but it’s mostly focused on your perspective. The survey closes Monday, November 24. Take it before then and we’ll award you 250 thwack points.

 

Take our survey!

Dear thwackPack, thwacksters, "The Informed"...

 

I come to you asking a favor. A favor that only you can help with. The thwack team is embarking on a mission with our wonderful User Experience team (katieb to be exact) in which we will be focused on improving the overall thwack experience.  Everything from navigation, to content organization, and even the home page experience will be reviewed over the next few months for improvement.  We are formally kicking off this project by conducting some research and this is where you come in.  We need to understand what do you find valuable?  What could you do without?  What is missing?  The list could go on forever (literally, Katie killed at least 10 of my questions) but we've narrowed it down to 21 questions which will immensely help us understand how you use thwack today.  Since this survey is so critical to the overall thwack experience, we are awarding 1,000 thwack points* to those who complete our survey.  So, are you game to help us shape "future thwack"?

 

Take our survey!

 

 

*This survey will close on November 12th.  Points will be awarded after the survey has closed.

Happy November to ya! I hope you all enjoyed that extra hour last night.  I mean, unless you're in Arizona (go Sun Devil's! 7-1) or somewhere in Hawaii... and in that case, you still win.  In other news… another data breach has happened! It seems like security breaches are regular fixture in headline news this year… so we want to help by sharing tips on security best practices which will help you proactively avoid threats and prepare for other potential security issues. Be better prepared to learn how to manage logs, meet compliance, and conduct root-cause analysis with SolarWinds Log & Event Manager. This month, you, "the good guys", will defeat the evil hackers!

 

November Mission

You're on a mission to solve the Hacker thwacker Cryptogram! Not quite the Security Pro? Not to worry - we're featuring a track geared towards Network and System Admins as well, so keep paying attention.  One question will be released each day starting November 3rd (Monday - Thursday).  After correctly answering a question, you will be given a "code" bit which will help you to solve the Cryptogram.  Make sure to grab a copy of the attached Cryptogram to fill out as you go.  Correctly answer all 4 questions in a given week and then submit that week's "phrase" each Friday to be entered to win that week's prize (listed in the rules below).  Correctly answer all 3 weeks of questions and submit the final phrase before November 26th to be entered to win the grand prize - a Samsung Galaxy Tablet S 8.4" 16 GB, Titanium Bronze tablet!

 

Mission Rules

  1. One question will be released in each track everyday starting November 3rd.
    1. Once a question opens, it will remain open until November 26th.  Check the schedule below for exact open/close times.
  2. 50 points will be awarded for each correctly answered question.  There are 15 questions in each track which means you can earn up to 750 points by completing a single track.
    1. You may complete more than one track.  You will earn an additional 750 points for each track completed.
    2. Points and badges will be applied to profiles once the mission has closed.
  3. You must correctly answer each day's question to move on and enter your thwack username and retrieve that day's "code". If you guess wrong, the page will simply refresh.
    1. You are allowed to guess an unlimited amount of times for each question, but you will only move on to the next page once the correct word has been entered.  We've tried to accommodate every variation of the answer so capitalization and other minor details should not be a problem.  Please contact me if you feel you have the correct answer but are having trouble moving forward.
  4. Those who successfully complete all 4 questions + enter the correct phrase during a given week, will be entered to win that week's prize (listed in the schedule below).
    1. You will receive 1 entry to the drawing for completing a single week in any given track.  Completing additional tracks will award points but will not earn extra entries to the weekly drawing.
  5. Those who successfully complete all 15 questions in a single track over the course of the month will be entered to win a Samsung Galaxy Tablet S 8.4" 16 GB, Titanium Bronze tablet!
    1. You will receive 1 entry to the drawing for completing a single track.  Completing additional tracks will award points but will not earn extra entries to the grand prize drawing.
  6. On November 24th, 25th, and 26th, there will be a survey featured each day.  Complete the surveys before November 30th to receive 250 points each.

 

 

Click on a track to access your schedule and questions!

                             

 

 

1410_Thwack_Crytogram_key_920x400.jpg

DOWNLOAD THE CRYPTOGRAM .PDF ATTACHED TO THIS DOCUMENT TO KEEP TRACK OF YOUR PROGRESS!

Filter Blog

By date: By tag: