With this release we have substantially improved the integration between IPAM and UDT making it much easier to find and fix IP conflicts
With the new releases of IPAM v4.3 you can now find and fix IP conflicts in two clicks using these new capabilities:
IP Conflict Detection Resource
IP Conflict Troubleshooting Resource
Sign up here to participate in upcoming research!
It's my pleasure to announce the release of NTA v4.1. This release makes a number of key improvements, including:
“I think NCM is an invaluable tool and I don’t know how we could really operate without it.” says Doug Hull in ahttp://www.solarwinds.com/resources/videos/got-regulations-detect-non-compliant-config-changes-with-ncm.htmlrecent interview. “It’s particularly good in a regulatory environment where you need to have a strong control over changes. For any kind of regulated environment, NCM is a very useful tool.”
Rise in data breaches and other cybercrimes has made the role of security polices & controls gain more prominence in overall network management. Administrators face many challenges trying to implement and manage these policies. The reason being, dynamic and growing networks of today comprise of numerous heterogeneous devices geographically spread over many locations. Administrators spend loads of time and effort to ensure that the required network security policies are in place. Most often these policies get implemented but then no regular controls or monitoring exists to ensure continuous compliance. The truth is that administrators lack the tools to track devices and changes applied to device configurations/defined policies.
Security policies define the measures to be taken to protect information assets. Change monitoring and compliance assessments ensure that the controls defined by the policy are enforced and in place. Policy defines standards like SOX, HIPPA, PCI DSS, DISA STIG, NIST, etc. Each standard has a specified set of objectives and controls are the actions taken to achieve the standard. For example, PCI DSS was designed to protect card holder data. One of the objectives specified by PCI DSS is - routers shall prohibit unauthorized access using strong passwords. The action taken to achieve this objective - configure routers to require user login passwords of 8 characters or more consisting of a mix of alpha and numeric characters.
Monitoring ensures policy controls remain enforced and don’t drift. Compliance assessment verifies controls are in place and that they remain true to the policy. For example, if a router does not have a strong password (according to specified controls) then it does not conform to the policy.
The role of compliance monitoring and assessment:
Continuous monitoring on the other hand, replaces point-in-time audits with a continuous view of the state of the network. The advantages are:
How does NCM help ensure policy compliance?
Compliance policies and controls can be implemented, however to enforce them, you need automation. NCM does not define the policy, but helps network admins accurately and consistently implement network security controls via device configuration settings, monitors them for unwanted change, and verifies if they comply with the baseline policy. In a broad manner NCM helps:
The price of non-conformance to policy controls is the likely presence of numerous vulnerabilities which can put networks/businesses at risk. Therefore, it’s mandatory for organizations to not only ensure daily compliance, but also continuously monitor for adherence to these policies. Choose a tool that saves loads of time and gives you visibility into compliance management and adherence across the entire network.
When it comes to VoIP, there’s plenty of good, bad and ugly. We’d like to hear about your experiences implementing and managing VoIP for your organization. Please click here to take our short 2-minute survey. We ask about a few of the nitty-gritty details, but it’s mostly focused on your perspective. The survey closes Monday, November 24. Take it before then and we’ll award you 250 thwack points.
Dear thwackPack, thwacksters, "The Informed"...
I come to you asking a favor. A favor that only you can help with. The thwack team is embarking on a mission with our wonderful User Experience team (katieb to be exact) in which we will be focused on improving the overall thwack experience. Everything from navigation, to content organization, and even the home page experience will be reviewed over the next few months for improvement. We are formally kicking off this project by conducting some research and this is where you come in. We need to understand what do you find valuable? What could you do without? What is missing? The list could go on forever (literally, Katie killed at least 10 of my questions) but we've narrowed it down to 21 questions which will immensely help us understand how you use thwack today. Since this survey is so critical to the overall thwack experience, we are awarding 1,000 thwack points* to those who complete our survey. So, are you game to help us shape "future thwack"?
*This survey will close on November 12th. Points will be awarded after the survey has closed.
Happy November to ya! I hope you all enjoyed that extra hour last night. I mean, unless you're in Arizona (go Sun Devil's! 7-1) or somewhere in Hawaii... and in that case, you still win. In other news… another data breach has happened! It seems like security breaches are regular fixture in headline news this year… so we want to help by sharing tips on security best practices which will help you proactively avoid threats and prepare for other potential security issues. Be better prepared to learn how to manage logs, meet compliance, and conduct root-cause analysis with SolarWinds Log & Event Manager. This month, you, "the good guys", will defeat the evil hackers!
You're on a mission to solve the Hacker thwacker Cryptogram! Not quite the Security Pro? Not to worry - we're featuring a track geared towards Network and System Admins as well, so keep paying attention. One question will be released each day starting November 3rd (Monday - Thursday). After correctly answering a question, you will be given a "code" bit which will help you to solve the Cryptogram. Make sure to grab a copy of the attached Cryptogram to fill out as you go. Correctly answer all 4 questions in a given week and then submit that week's "phrase" each Friday to be entered to win that week's prize (listed in the rules below). Correctly answer all 3 weeks of questions and submit the final phrase before November 26th to be entered to win the grand prize - a Samsung Galaxy Tablet S 8.4" 16 GB, Titanium Bronze tablet!