Blog
Why is Bandwidth Monitoring Important?
By Kevin Jackson on Fri, 06/26/2020
What's the importance of bandwidth speed, capacity, and usage? Learn why monitoring these key metrics can help meaintain peak network performance.
Blog
Why You Should Integrate Your DLP with MFT
By Brian Pick on Thu, 06/18/2020
Discover how integrating data loss prevention (DLP), threat protection, and managed file transfer (MFT) solutions can bolster the security of your sensitive data.
Blog
IT & COVID-19: The 3 Phases of Supporting a Remote Workforce
By David Zacharias on Tue, 06/09/2020
Coronavirus (COVID-19) has brought about unprecedented times. Let us help you maintain business as (sort of) usual.
Blog
7 Tips for Delivering Exceptional IT Network Monitoring Support to End Users
By Kevin Jackson on Tue, 05/12/2020
Tech-driven organizations need IT in order to stay productive and meet business goals. As demands on IT departments grow, how can IT continue to deliver exceptional support and service to end users even as demands on their time are higher than ever?
Blog
3 Key Strategies for Cloud Infrastructure Monitoring
By Kevin Jackson on Mon, 05/11/2020
Learn three ways to leverage network monitoring for devices in the cloud. From network mapping to network automation, here’s how Intermapper can help you keep an eye on your cloud infrastructure.
Blog
3 Ways to Prepare Your Network for Unexpected Times
By Kevin Jackson on Mon, 03/16/2020
Leverage a comprehensive network monitoring solution to ensure smooth network performance when unexpected events arise.
Blog
30 Ways to Simplify Life with Advanced Workflows
By Brian Pick on Thu, 02/27/2020
Are you using GoAnywhere’s Advanced Workflows yet? If not, you’re missing out.
Blog
Three Lessons Learned from A Data Breach
By Bob Erdman on Mon, 02/24/2020
Simple lessons learned from the many breaches we’ve observed, like careless employees and unusual attack vectors, and ways they can be avoided.
Blog
How A One-Woman IT Department Brought Modern Education Technology to a Rural School District
By Kevin Jackson on Tue, 02/11/2020
Can a rural school district provide students with the same modern technology as larger districts? Lisa Nelson of Douglass ISD in Texas made it her mission to do so, and she succeeded.
Blog
The One IT Software Every Organization Should Budget for This Year
By Kevin Jackson on Tue, 02/11/2020
Now’s the time when organizations finalize their budgets for next year. As spending increases on technology, investing in a network monitoring tool is more important than ever. Find out why and how to justify the ROI to your boss in this article.
Blog
What Does “Real-Time Network Monitoring” Mean, Exactly?
By Kevin Jackson on Fri, 01/31/2020
Real-time network monitoring usually means very, very fast and frequent network polling—which is close enough to real-time that we don’t bother to add caveats around it.
Case Study
Alaska Communications Reaches New Heights with Network Monitoring from Intermapper
Alaska Communications is an internet service provider (ISP) supporting communications infrastructure in Alaska. Their team provides critical network services to customers—oftentimes, in remote locations. The company was in the midst of developing plans for a new site—one which was located on a mountaintop. With this remote site, they knew they were in for an uphill battle regarding maintenance and...
Blog
What Causes Network Blind Spots—and How to Prevent Them
By Kevin Jackson on Thu, 11/21/2019
A lack of network visibility opens the door to IT disruptions, downtime, and security threats. Here’s what you can do to guard against dangerous network blind spots.
Blog
You Can’t Protect What You Can’t See: Improving Cybersecurity with Monitoring Solutions
By Bob Erdman on Mon, 10/07/2019
Find out how SIEMs with threat escalation, centralization, diverse integrations, and collaboration with network monitoring tools can help clear the line of sight.
Blog
Five Secure File Transfer Alternatives to FTP
Mon, 09/16/2019
FTP was a gold standard for file transfers in the 70s. But with today’s cybersecurity concerns, it’s no longer enough. Use these five secure file transfer methods to protect your data instead.
Blog
The Importance of Network Monitoring in the Internet of Medical Things (IoMT)
Wed, 08/21/2019
Learn why network monitoring software is critical for the Internet of Medical Things (IoMT) and keeping healthcare facilities and hospital networks healthy.