Processing...
All posts in: "Industry"

Best Practices to Combat Route Leaks and Hijacks

Posted by on January 26, 2017

In past blogs, we’ve explored how you can alert for and diagnose BGP route leaks and hijacks. Route leaks and hijacks—routing events where illegitimate prefixes are wrongly propagated through the Internet—are notoriously difficult to troubleshoot and have the potential to bring down entire swaths of the Internet.… Read More »

What Does Collective Intelligence Mean for Network Ops?

Posted by on January 4, 2017

Over the past year, we’ve witnessed the development of a new and important movement in the networking community: Collective Intelligence. While the meaning of Collective Intelligence has evolved, its emergence indicates an increasingly apparent need for useful data collected from a variety of vantage points, that is efficiently analyzed to produce actionable insights.… Read More »

Efficient Vulnerability Management with Qualys

Posted by on August 12, 2014

Vulnerability management (VM) is the process of discovering and remediating system vulnerabilities with the purpose of keeping information security risks at acceptable level. All IT systems have vulnerabilities. A vulnerability is a weakness which allows an attacker to reduce the confidentiality, integrity and/or availability of information. We still remember the major vulnerability discovered this year in OpenSSL… Read More »

The Evolution of Network Monitoring

Posted by on July 1, 2014

In the last 10 years we’ve seen a radical change in the way applications are delivered in enterprise environments. Workstations and desktops have been replaced with mobile devices such as phones and tablets or thin clients that connect to centralized VDI servers. On premise bare metal servers have been virtualized and consolidated, and applications that used to be on the… Read More »

Identity Management for the Cloud Era – Part I: Challenges of User Access Management

Posted by on February 25, 2014

Many organizations struggle when it comes to proper user access management to applications, systems, and services. It was already challenging to properly provision, de-provision, and manage access to all internal applications, and when cloud applications came into play these tasks became resource consuming and associated risks increased. Forrester Research states… Read More »

451 Research: IT Gets a New Tool to Solve SaaS Performance Challenges

451-Research-Logo
Posted by on January 22, 2014

Last month 451 Research, an independent analyst company focused on the business of enterprise IT innovation, published an Impact Report by Peter Christy and Dennis Callaghan. The report addresses the new challenges IT teams face as SaaS applications are being adopted in their organizations. They found ThousandEyes to be “an innovative and differentiated application to address the new problems” of SaaS performance.
Read More »

Reality Check: A Survey of Cloud Providers for Top Sites

Type of Hosting for Top US Sites
Posted by on November 26, 2013

At ThousandEyes we deal with huge volumes of data collected from our agents across the Internet. A large number of our tests are configured to target public facing web sites owned by our customers. The performance of each site depends heavily on the provider hosting the site and how well it is connected to the Internet, especially for sites with a global footprint of users. … Read More »

Top 5 Prescriptions for Alert Fatigue

Solutions for monitoring alert fatigue
Posted by on November 5, 2013

Alert Fatigue is a common problem in monitoring systems, and happens whenever there’s an excess of alerts being triggered that are mostly false positives, i.e. noise. Finding a good balance of false negatives and false positives is somewhat an art rather than a science. In this article I will talk about some techniques to mitigate alert fatigue.… Read More »

Performance is not Speed

underlying performance problems iceberg
Posted by on August 29, 2013

Over the last few years, I’ve seen a lot of discussions and content online that equate the performance of an application with speed, most notably from the web performance and WPO (web performance optimization) communities. The corollary of this trend is to equate end user experience with the time it takes for a web page to load, aka RUM or real-user monitoring, but performance is not speed. … Read More »