How To Scale Network Monitoring Effectively
This guide is designed for IT Managers looking to scale their Network monitoring in their organisation.
Key Points:
- The pros and cons of scaling by adding staff members.
- The pros and cons of scaling by changing processes.
- Risks of scaling your network.
- Mean Time Between Faults (MTBF).
- Mean Time To Resolution (MTTR).
- The guide discusses the best approach for increasing your monitoring capabilities and increasing your capacity for revenue generation while ensuring that the costs of doing business aren’t inflated at the same rate.
NMIS Initial Setup and Configuration
Join Mark Henry in this session as he demonstrates how easy it is to get NMIS, Opmantek’s open source solution, configured and ready to be used. Opmantek’s leading network monitoring solution, NMIS, an intelligent solution that will help you automate your problems away.
Join us for this 30-minute session while we learn:
- What Features you need to know in V8.6.7G
- Prerequisites (incl sizing your VM and installation)
- NMIS Setup
- NMIS Configuration
NMS Security Architecture Considerations & Approaches
This whitepaper by Principal Consultant of Neon Knight Consulting Anthony Kirkham covers how organizations can increasing the probability of detecting breaches using actionable guidance that will strengthen their Network Management’s security posture.
- How quick detection may be the difference between being able to respond quickly and effectively, or, incurring a severe business and reputational impact.
- Practical guidance & solutions on securing Network Management systems and associated infrastructure.
- Mitigation Strategies to Prevent Malware Delivery and Execution.
- Mitigation Strategies to Limit the Extent of Cyber Security Incidents.
- Mitigation Strategies to Recover Data and System Availability.
- Tools & techniques can be used to provide high value in improving the security posture through Visibility.
- Why Align with Zero Trust Architectures.
- & more!
Cooking with Tidelift
When cooking for friends or family, many of us go out of the way to seek the freshest, tastiest ingredients possible. You may have favorite producers at the local farmers market, or brands from the grocery that you've come to know and trust. But when choosing the ingredients that make up our open source applications, we often bring in new libraries without any guarantees that they are safe and well maintained.
We wanted to distill the idea of managing open source down to something so simple, you could explain it to a child, so that’s why we wrote a children’s book about enterprise open source software management. Yes, we just used the phrases “children’s book” and “enterprise open source software” in the same sentence.
We call it Cooking with Tidelift, and it will show you how we can help you create catalogs of known-good, proactively maintained open source components to ensure your apps are as safe and healthy as they can be.
The Tidelift Guide to Managing Open Source
The best way to get the most of open source? Ensure the organization has a comprehensive strategy for managing open source in place.
In this guide, you will learn:
- Why open source software is the modern application development platform, and why developers love open source software.
- The areas in which unmanaged open source drains productivity and increases risk.
- How to understand, design, build, and transform your organization's approach to managing open source components.
The 2022 Open Source Software Supply Chain Survey Report
In this year’s survey, we learned how current events like the SolarWinds and Log4Shell software supply chain exploits and new government initiatives like the White House executive order on improving the nation’s cybersecurity are changing the way organizations manage open source.
We explored the most urgent challenges development teams face when building applications with open source. We collected data regarding how confident technologists are in their organizations’ current open source management practices, and in the open source components and languages they use more generally. Finally, we dove deep into several open source management best practices, including the use of software bills of materials (SBOMs) and repositories of approved open source components.
Log4Shell, Open Source Maintenance, And Why SBOMs Are Critical Now
Tidelift CEO and co-founder Donald Fischer and guest speaker Forrester Principal Analyst Sandy Carielli discussed some of the key lessons organizations can learn from Log4Shell along with some critical recommendations organizations can use to prepare for handling similar issues down the road.
Sandy and Donald talked about how enterprise organizations should:
- Use software bills of materials to better understand and manage their open source software supply chain.
- Enhance their visibility of the open source components being used and the associated transitive dependencies.
- Focus on proactive open source maintenance and how to better prepare their teams to quickly mitigate the risk of future vulnerabilities.
- Consider the role open source maintainers play in risk planning and mitigation.
Panasonic UAS Drone Draft
Unmanned Aerial Systems (UASs) and robots are frequently deployed by military to improve situational awareness, perform recon, and even to deploy emergency rations, ammunitions, or other payloads. A critical part of every military UAS and robot system is the ground-based controller – handheld or laptop-based – that guides devices to where they need to be; collects video, thermal, audio, or other information; and safely returns when their mission has been completed.
This paper examines what goes into a successful UAS deployment, with a particular focus on the considerations for choosing the mobile device at the heart of each controller. It also includes a real-world case study demonstrating the importance of choosing the right mobile device for the job.
CIO Challenges: EA Disconnected from Business Stakeholders
What are the main concerns facing Chief Information Officers today? Orbus Software have identified 8 major issues that every enterprise is likely to struggle with when it comes to meeting the demands of the digital age.
Across the series of CIO Challenges Orbus have released thus far, a common thread has been the importance of Enterprise Architecture (EA) for the management and organization of IT. However, simply starting an EA team or expanding an existing one is not an instant panacea, as the contribution of EA can often be hampered by a lack of communication & cooperation between EA and other parts of the business.
In this eBook, we’ll discuss how disconnected teams can harm transformation efforts, and how the right setup for EA can deliver successful business outcomes.
TOGAF 9.2 Content Meta-Model: Building Blocks and Notation
New updated TOGAF 9.2 Content Meta-Model poster!
This poster provides you with the valuable building blocks of TOGAF 9.2, accompanied by helpful, contextual notations to guide you through the key elements of the framework.
TOGAF 9.2 in Pictures
The ADM is an iterative process used to understand existing architectures and work out the best way to change and improve them.
Never used without some adaptation, the ADM is more like a cookbook of recommendations, ideas and checklists than a set way of doing things.
Think of it in three chunks and bear in mind that in a large enterprise, there may be quite a few projects all using different phases of the ADM.
The Guide to Business Capability Modeling
Business Capability Modeling (or Mapping) is the act of breaking down an organization’s activities into a set of capabilities, which together represent everything the business can do.
In order to understand how a business needs to change, it needs to understand itself. In modern enterprises, with thousands of employees, hundreds of locations and dozens of functions, this is no simple task. Business Capability Modeling transforms the organization into an easily understood set of capabilities, which represent all the different things a business does. This can be used as the basis to understand how people, processes, information & technology support the business.
Five Steps to Designing a Fully Optimized Enterprise Architecture
The enterprise architect must, despite all the technical complexities and challenges, remain outcome focused; rarely are stakeholders interested in the science behind the processes, but rather they are happy to trust their experts. It is simply the results that matter. This requires measurable deliverables and milestones that tangibly demonstrate our progress in an easily digestible format. Working in iterations architects can develop and target a set of goals, tied to key business outcomes.
Throughout the evolution of your EA practice, keep in mind it is a journey and not a destination. By making use of a maturity model, you drill deeper into each iterative step, understanding what it looks like and how to move towards fully optimized enterprise architecture. The Orbus Software Enterprise Architecture Maturity Assessment demonstrates where your organization currently sits, and provides a platform for you to benchmark against competitors, and industry standards. You are able to use the assessment as a way to develop your EA practice to meet the demands of the digital age.
Financial Services: Rapid Adaptation to the Unforeseen Requires Enterprise Architecture
At this point, it almost goes without saying that the global pandemic completely upended the idea that companies could be prepared for anything. No amount of 5 year plans or cautious growth can help when your whole business is forced to close or all your workers stay at home. Organizations that survived and even thrived were those that were able to adapt their business models along with the supporting technology. The only preparation that proved valuable was being prepared to move quickly.
Adaptability is an easy gospel to preach for nimble startups and agile tech firms, but for banks and financial services companies you might as well start speaking Hungarian. Even if institutions can get a grip on the blockchain or can define DeFi, there are still huge regulatory barriers to everything a company tries to do.
This eBook will look at 4 major challenges facing financial services firms in the near future, and the potential solutions that can be delivered.
CIO Challenges Mounting Technical Debt with an Unclear Roadmap
What are the main concerns facing Chief Information Officers today? Orbus Software have identified 8 major issues that every enterprise is likely to struggle with when it comes to meeting the demands of the digital age.
The concept of technical debt has been well understood in software development for decades, but it applies just as well to a firm’s overall technology infrastructure. Enterprises will often maintain legacy systems well beyond their useful life, or cut corners to meet project deadlines and then fail to adjust or update the technology workarounds used. As these old and low quality systems proliferate, costs rise and it becomes increasingly difficult to enact changes.
This eBook will look at how technical debt will mount for businesses and the difficulties of addressing this problem without a clear and sensible roadmap.