Resources tagged "Author: Chris Hindy"

Living the Monitoring Renaissance

Living the Monitoring Renaissance

We at Empowered have been doing intensive testing of the LogicMonitor platform over the past few months. LogicMonitor provides all the monitoring most customers will need in one place at one price. LogicMonitor is a cloud-based product with on-premises collectors.

Love Maps? Check Out the New Topology Viewer for NetMRI

Love Maps? Check Out the New Topology Viewer for NetMRI

Let me admit the awful truth: I am a map geek.  I love maps.  I have maps of various types and vintages framed and on the walls of my house.  When I was a young kid, the sure-fire way to entertain me was to hand me a copy of “Perly’s […]

Two Schools of Thought on Network Vulnerability Management

Two Schools of Thought on Network Vulnerability Management

There’s a conversation that goes on all the time between Network Engineers and Security Analysts. The Information Security team will perform vulnerability analysis of network devices and tell the Networking team “Here’s a list of all the known security vulnerabilities that has released. Please go fix them.” And the Network […]

Solving the PSIRT Challenge

Solving the PSIRT Challenge

How many times has this happened to you? You’re out with IT friends after work and one of them mentions “Hey, did you see that PSIRT advisory from Cisco that just came out? Wow, that’s going to be a big problem for us to fix!” As you nod gravely, you […]

Control and Secure Your Network with NetMRI and NetMRI Advisor

Control and Secure Your Network with NetMRI and NetMRI Advisor

You’re a network engineer at a large home goods retailer with stores from coast to coast.   You’re responsible for networks that cover your more than two thousand stores from Mexico to Canada and everywhere in between.  You take care of networking for a collection of regional distribution centres, and for […]

HowTo: Start Using NetMRI Policy

Sanity or Insanity Arrows Concept

Sanity: We in network operations desire it.  Crave it, really.  And it seems tricky to find sometimes in complex network implementations.  When we deploy networks in the real world of mergers and acquisitions, upgrades and new vendors, it can be awfully hard to keep your sanity.  When I work with […]

5 Reasons Your Network Can’t Adapt to Change

5 Reasons Your Network Can’t Adapt to Change

Do your network tools keep up with what you plan to deploy? If not, you can run into all sorts of issues. Here are five ways your network tools might be falling short: Hardware gets faster and software releases, updates and patches are always coming in. That’s normal. Just keeping […]

Configuring Your Network Devices with Infoblox DDI

Configuring Your Network Devices with Infoblox DDI

When you configure your network devices, the primary variables are the IP addresses and subnets you assign to it. Those variables impact your defined network security zones, and how data flows through “controlled network” zones, where compliance matters. Here are some advantages to integrating these functions:

Network Automation Best Practices – Knowing vs. Following

Network Automation Best Practices – Knowing vs. Following

“When you automate strongly, then you can automate the best practices…you no longer have to worry about that one admin who thinks he knows better than everyone else…[then] suddenly you’ve spread a bad change across your entire enterprise.”

Compliance is Key to NCCM

Compliance is Key to NCCM

One of the main conversations that I have around Network Configuration & Compliance Management (NCCM) and NetMRI is the need to ensure that their networks can be demonstrated to be compliant with regulatory requirements and standards. Most frequently, the conversation is around the PCI Data Security Standard (PCI DSS), since […]