Comments
-
This is a great way to put together some of the best of thwack in a meaningful timeline of how the information can be applied.
-
For many companies without much IT resources hosting DBs in the cloud may be more secure than maintaining one in house on an internet connected server/pc. The bar for entry, and even to make it secure is pretty low as long as the consuming application validates inputs properly with proper authentication and encrypted…
-
I'm all for logging the right things, but everything all the time is likely to create more noise than needed. I would rather have the option to turn on, the log everything during points in time, and than shut it down to free up resources. I use spanning ports and sniff all my traffic, but not at the expense of throughput.…
-
Very interesting indeed, a game that even changes characters when you travel different geographical areas. Even better yet, forces you to explore each of these new environments. In the big cities you don't even look strange having your phone out anymore, "cause everyone is doing it." I can only begin the imagine the…
-
This does look interesting, I'll have to check out a demo.
-
maria.bungau, Mostly I hang out right here, but I frequently check out the Geek Speak, and other areas of Thwack product forums to get a gimps of what I'm missing out on. Hopefully in the next 2-3 years we'll have Solarwinds rolling at my new employer, for now we are using a number of different tools to do the same things…
-
By the way the linked video was very good, I think sometimes we need to sit back and think about our "why" for all areas of our life..
-
Polling in near real-time would be great if the impact was not also real-time. I have found on my larger bandwidth circuits that polling at greater frequency has had little impact on the hardware or traffic, it does however make the monitoring system one of the top talkers through out the network. I think as long as…
-
Vulnerability management and Patch management complement each other. Yes most patch management systems are able to track what patches are missing, but a good vulnerability management system, can complement your patch management system by identifying: * Systems that fell out of scope of your patch management system *…
-
Yeah especially being alerted when a change has been made in the first place.
-
I think the biggest area missing in storage strategy is prioritizing what data needs to stored on what media, and for how long. Some just find it easier to buy the same of everything not realizing the cost savings to put that 80% on lower performance higher density media. That along with not accounting for storage…
-
A Past TriGeo, and not a current LEM client. Looking forward from feed back from others that sign up for the beta. I'm looking for more inclusion of custom threat feeds I already subscribe to, and manually review a number of active threats per day. It would be nice to pull in for instance feeds from community partners in…
-
Yeah now we are putting in those 40 Gbps links and with VMware it still may not be enough.
-
Enough pictures on the supernap.com website to make our datacenter look like a closet.
-
Thank you jkump for your comments, I might have to try it out on the systems we already have in NCM. Currently we have a third party managing our main firewalls for this purpose, but if we could somehow pull the change management in-house, and just use them or someone else for monitoring, I think this might be the way to…
-
Congrats john.frisbee@gfcmsu.edu now you can respond to alerts in style. Or at least have fun while not responding. Have fun.
-
A very common argument superfly99 with one flaw that usually comes back to bite IT management. With the IT Generalist, there are already many of those that can do some of all, but this issue is that they usually can only touch the surface of the technology unless they are truly passionate and gifted enough to be able to…
-
My personal experience, monitoring IIS app pool memory has been the most common performance issue by far. Understanding that App pools were designed to help ensure that in a multi-website hosted environment that one site crashing should not effect another site. The biggest issues of course being that if one of the app…
-
Ah today's question was a tricky one. There are two answers that could be right cause they say it two different ways in the video and transcript both could fit, so it is kind of 50/50. bummer.
-
The interesting thing is that a few encrypted e-mail systems do the same thing, where the e-mail never leaves the system, just a notification that a message is waiting, and that the messages are encrypted at rest. I have used this method to pass information to myself in a pinch, but learning that it can be used by multiple…
-
congrats byrona I bet your wife will understand for a little while, but it does remind me of a Christmas Story when the dad wins that leg lamp, so I guess it could be worse...
-
Nice, I don't think I would have guessed that. I was reading the manual but could not fit what I thought it was into the provided question. The hint did not add much value, so a hunt for the answer commenced,
-
What a well rounded explanation of how each area improves Customer Self-service. It is a pretty good example of how Solarwinds supports their customers. I think the biggest area impact and goldmine fun of great IT information is the Thwack forum. While I know Solarwinds main objective is to sell their products and keep…
-
I see a lot of benefits of leveraging the cloud. For example we use a cloud WAF/CDN/DDoS Protection and a Load Balancer with a Reverse Proxy that points to each of our datacenters. Many hosting providers provide this as an add on service now. So an attacker or end user may not have a clue on where your data is stored. What…
-
There once was a happy web master with a web development change process that included help desk software, subversion "SVN" with commented changes that matched the ticket number. This helped to document who authorized the changes to the website, each department manager was in charge of approval of their section. All was…
-
compared to Nessus NCM is no where close to these tools. So calling it a vulnerability scanning tool or even a management is likely going to cause an executive somewhere a false sense of security. I would doubt it would find all vulnerabilities in Cisco if all it is relying on is cvvs.
-
I like the ease, and speed of use. It would be interesting to see how well it can support other applications. I'm assuming cloud based web apps would be the best as they would they could always be placed close to the DB with minimal latency. I also like the ability add additional DB servers in different geo locations. I…
-
Another Vote from a Rukus user. Had some issues, but would really like to see Heatmaps for other APs then just Cisco. I know it requires development, and managing APIs, Maybe a Survey to see what are the top managed APs is needed to help prioritize which ones need to be adopted first.
-
I think the biggest hurdle for non-cisco devices such as Juniper, is configuring the reports. However once you get going it is very easy to automate and monitor compliance with all your configurations.
-
I had looked at several IPAMS, we were already a Solarwind's shop, and boy am I glad I started using their IPAM. It was originally missing a lot of features, but now they have a few of their own.