Guide
Download "How IT Professionals Can Navigate SOX Compliance"
Compliance with Sarbanes-Oxley (SOX) is impossible without IT professionals, but translating this law into IT action items is a challenge.
With penalties up to $10 million fines and even prison time, following SOX—and proving you're compliant—is vital.
This compliance guide breaks down the most important aspects of SOX that affect IT professionals and focuses on what you need to know to get...
Article
Intermapper Application for Splunk Answers Need for Log Analytics in Network Management
By Shamus McGillicuddy on Wed, 09/07/2016
The Intermapper application for Splunk brings together Intermapper's robust network monitoring software with Splunk's high-powered searches and analysis of data stores.
Guide
Download "How IT Professionals Can Navigate HIPAA Compliance" Guide
The Health Insurance Portability and Accountability Act (HIPAA) is one of today’s most common compliance mandates, but translating this law into IT action items is a challenge.
As fines increase and more audits are scheduled, figuring out how which data HIPAA protects and how to bring your system into compliance is more important than ever.
This compliance guide breaks down some of the thorniest...
Article
Why IT Departments Benefit from Upgrading to SNMPv3
By Kevin Jackson on Mon, 08/29/2016
Upgrading to SNMPv3 is a best practice for most organizations, but that doesn't make it the easiest transition. Learn how Intermapper can help you successfully upgrade to and deploy SNMPv3.
Article
7 Questions to Ask About the Support Your Network Mapping Software Provides
By Kevin Jackson on Mon, 08/29/2016
The best network mapping software offers great support. What should great support include? Here are seven questions to ask potential software vendors about the support they provide their users.
Blog
Everything You Need to Know About Network Probes
By Kevin Jackson on Wed, 08/24/2016
What are probes, how do they work, and why are they so essential to network monitoring?
Article
How Network Monitoring and Document Management Work Together
By Kevin Jackson on Wed, 08/24/2016
Maximize productivity and amp up your security by using network monitoring and document management solutions together.
Article
Monitor, Capture, and Send Log Events With Powertech SIEM Agent for IBM i
By Robin Tatam on Sun, 08/21/2016
In recent years, regulatory initiatives like Sarbanes-Oxley, HIPAA, PCI, and GLBA have placed increased emphasis on the need to monitor and secure sensitive information. For example, The Payment Card Industry (PCI) Data Security Standard dictates one of the most stringent requirements of all—logs must be reviewed daily, and a minimum of three months of logs must be available for analysis.
Blog
Three Reasons You Need an Updated Security Policy
Sun, 08/21/2016
If you still think creating and maintaining a security policy isn’t necessary, you could be setting up your organization for an unpleasant surprise. Check out the top three reasons businesses need an up-to-date security policy.
Blog
IT Security Compliance 101
By Robin Tatam on Sun, 08/21/2016
In this compliance 101 primer, we'll look at three high-profile breaches from the past year, each of which shows what can go wrong when data oversight isn't up to snuff. Along the way, we'll discuss some basic fixes that can help shore up network defenses.
Article
How Intermapper Helps Businesses Stay Compliant
By Kevin Jackson on Fri, 08/19/2016
Keeping up with compliance regulations from governing bodies or your own internal team is essential to prevent security breaches and hefty fines. Learn how our network monitoring software can help keep your business compliant.
Blog
5 Steps to Streamline Your Network Monitoring Process
By Kevin Jackson on Fri, 08/19/2016
Learn five ways to maximize the efficiency of your network monitoring solution and streamline its implementation to make sure it's keeping your network as healthy as possible.
Article
How to Achieve Optimal Network Performance
By Kevin Jackson on Fri, 08/19/2016
Learn three key tenets of network optimization and how a network monitoring software can assist in this task.
Blog
7 Network Monitoring Basics Every IT Professional Should Know
By Kevin Jackson on Fri, 08/19/2016
Every organization has a network. Whether you’re a new IT professional or seasoned in technology management, here are seven network monitoring basics you should know.
Blog
The Impact of IPv6 on Network Management
By Kevin Jackson on Fri, 08/19/2016
With the unstoppable growth of IP-enabled devices, the move to IPv6 has been on the minds of network administators for years. Learn how to prepare for the future with the right software in place.
Blog
Why Businesses Thrive When they Monitor and Report on Network Performance
By Kevin Jackson on Fri, 08/19/2016
Far too many organizations fail to take the proactive approach to network oversight. Learn how monitoring and reporting on network performance helps keep business thriving and customers happy.
Blog
Tips for Getting the Budget Greenlight on the Network Monitoring Tools You Need
By Kevin Jackson on Fri, 08/19/2016
Getting budgets approved is no easy feat--especially when it comes to software. Here are a few benefits of network monitoring software that can be useful when making a case to upper management.
Article
Our Top 5 Favorite Probes
By Kevin Jackson on Fri, 08/19/2016
Intermapper comes with 150 built-in probes. From SNMP Traffic probes to Host Resources probes, see which ones made our top five list.
Article
Improve Event Auditing Using the System Audit Journal
By Sandi Moore on Fri, 08/19/2016
With any security implementation, established rules become less effective as time passes. Because your security requirements and your systems aren’t static, you must continually audit and adapt your security plan to stay current. Be aware that your system is constantly changing.