Processing...
All posts in: "Industry"

Automating Performance Monitoring at Microsoft

Posted by on April 27, 2017
April 27th, 2017

Last week we took ThousandEyes Connect to the road and visited Seattle, bringing together network engineers, architects and site reliability teams to discuss network performance. Scott Hinckley, Sr. Site Reliability Engineer for Microsoft Dynamics 365, opened up the morning presentations.… Read More »

What Is Net Neutrality?

Posted by on April 18, 2017
April 18th, 2017

Over the past 3 years, net neutrality has been a hot political topic as the Obama and Trump administrations have taken diverging positions. Most recently, with a repeal of 2015 privacy protections, the Trump Administration has signalled a move away from the principle of net neutrality. … Read More »

Best Practices to Combat Route Leaks and Hijacks

Posted by on January 26, 2017
January 26th, 2017

In past blogs, we’ve explored how you can alert for and diagnose BGP route leaks and hijacks. Route leaks and hijacks—routing events where illegitimate prefixes are wrongly propagated through the Internet—are notoriously difficult to troubleshoot and have the potential to bring down entire swaths of the Internet.… Read More »

What Does Collective Intelligence Mean for Network Ops?

Posted by on January 4, 2017
February 10th, 2017

Over the past year, we’ve witnessed the development of a new and important movement in the networking community: Collective Intelligence. While the meaning of Collective Intelligence has evolved, its emergence indicates an increasingly apparent need for useful data collected from a variety of vantage points, that is efficiently analyzed to produce actionable insights.… Read More »

Efficient Vulnerability Management with Qualys

Posted by on August 12, 2014
March 18th, 2015

Vulnerability management (VM) is the process of discovering and remediating system vulnerabilities with the purpose of keeping information security risks at acceptable level. All IT systems have vulnerabilities. A vulnerability is a weakness which allows an attacker to reduce the confidentiality, integrity and/or availability of information. We still remember the major vulnerability discovered this year in OpenSSL… Read More »

The Evolution of Network Monitoring

Posted by on July 1, 2014
March 18th, 2015

In the last 10 years we’ve seen a radical change in the way applications are delivered in enterprise environments. Workstations and desktops have been replaced with mobile devices such as phones and tablets or thin clients that connect to centralized VDI servers. On premise bare metal servers have been virtualized and consolidated, and applications that used to be on the… Read More »

Identity Management for the Cloud Era – Part I: Challenges of User Access Management

Posted by on February 25, 2014
January 9th, 2017

Many organizations struggle when it comes to proper user access management to applications, systems, and services. It was already challenging to properly provision, de-provision, and manage access to all internal applications, and when cloud applications came into play these tasks became resource consuming and associated risks increased. Forrester Research states… Read More »

451 Research: IT Gets a New Tool to Solve SaaS Performance Challenges

451-Research-Logo
Posted by on January 22, 2014
March 18th, 2015

Last month 451 Research, an independent analyst company focused on the business of enterprise IT innovation, published an Impact Report by Peter Christy and Dennis Callaghan. The report addresses the new challenges IT teams face as SaaS applications are being adopted in their organizations. They found ThousandEyes to be “an innovative and differentiated application to address the new problems” of SaaS performance.
Read More »

Reality Check: A Survey of Cloud Providers for Top Sites

Type of Hosting for Top US Sites
Posted by on November 26, 2013
January 21st, 2016

At ThousandEyes we deal with huge volumes of data collected from our agents across the Internet. A large number of our tests are configured to target public facing web sites owned by our customers. The performance of each site depends heavily on the provider hosting the site and how well it is connected to the Internet, especially for sites with a global footprint of users. … Read More »