The most recent content from our members.
Recently, I wrote an article titled Life Cycle Monitoring: Why an Ounce of Prevention Is Worth a Pound of a Cure. The great Benjamin Franklin coined the term. In the article, I highlighted the value, efficiency, and logic of putting more time into a proper capacity planning and optimization process for all types of IT…
If you’re using network monitoring solutions (regardless if it is an enterprise size or designed rather for smaller environments) to digest log messages from your network devices, sooner or later you’ll likely notice some performance issues caused by the hundred-thousands (or even millions) of syslog messages and SNMP…
Do you know how to protect your organization's sensitive data from today’s cyberthreats? One way is to arm the enterprise with a security information and event management (SIEM) tool. SIEM solutions provide a meaningful contribution to defense-in-depth strategies with their ability to detect, defend against, and conduct…
By Omar Rafik, SolarWinds Senior Manager, Federal Sales Engineering Here’s an interesting article by my colleague Jim Hansen about the role of SIEM tools. SIEM products can offer a powerful defense and our SIEM tool has always been one of my favorite SolarWinds products. While there is no one single solution to guard…
You’ve been asking and we’ve been listening. We are excited to announce that the newest member of the SolarWinds product family, Log Manager for Orion, is now available for trial. Built on the Orion Platform, Log Manager provides unified infrastructure performance and log data in a single console. No need to hop back and…
We're doing some research around improving Orion's syslog and SNMP trap capabilities. As part of this task, we need to obtain samples of syslog and SNMP trap rules from customer's environments in order to understand how our users are currently leveraging rules. Please follow the steps below to submit your rules to us and…
By Joe Kim, SolarWinds EVP, Engineering and Global CTO Ensuring that deployed U.S. troops can communicate and exchange information is critical to the military’s missions. That said, there are numerous challenges in deploying the high-speed tactical networks that make this communication possible. How, for example, do you…
From the dawn of computers and networks, log management has been an integral part of managing and monitoring IT processes. Today, managing log messages is instrumental to troubleshooting network issues and detecting security breaches. Log management involves collecting, analyzing, transmitting, storing, archiving, and…
You’ve probably heard a lot about how government agencies need to move on from legacy technology in order to become more agile and built for the future, but what about moving on from a legacy culture? The traditional approach consisted of development and operations teams working in separate silos, each with their own roles…
It looks like you're new here. Sign in or register to get started.