With the security issues associated with SolarWinds - are people switching to other vendors? Which ones are you switching to?
Thousand Eyes acquired by Cisco, interesting synergies with AppDynamics APM.
We, at MapleLabs have developed best-of-the breed APM & Log mgmt. product SnappyFlow (https://www.snappyflow.io/#/). SnappyFlow is a unique APM & Log Monitoring application that brings together metrics, logs, tracing & synthetic monitoring in an elegant workflow and unified view. We work with SaaS companies having Cloud native applications that are micro services based, dispersed across VMs, Kubernetes & Cloud Services and straddle hybrid Clouds. SnappyFlow is best suited to optimize your cloud native apps, maximize the performance and availability of your cloud infrastructure. SnappyFlow is currently listed in AWS and vCenter marketplace and very cost-effective, scalable and flexible solution compared to its peers, including Cloudwatch. We're offering extended free trials till the time you're comfortable with the product. Please give it a thought. Thanks!
Please check out InfraonIMS from EverestIMS Technologies.
(https://www.everestims.com/inf...)The major advantage is an integrated solution which not only monitors the complete IT Infra but also provides complete visibility into the ticket lifecycle for any issues detected via the PINK-Certified InfraonDesk ITSM engine. From a security standpoint, the tool is OWASP Certified for higher levels of protection against malicious attacks.
@reviewer1140534 What experience do you have with this tool? I'm looking for NCM alternative for a medium size network (3000 network devices like routers and switches)
The hackers targeted SolarWinds because SolarWinds has many customers. To minimize the risk of being hacked through one of your vendors, this suggests choosing unpopular vendors with few customers. Which is completely irrational.
Summary - this is a really hard problem and switching vendors does nothing to reduce your risk of this type of hack.
@Bernd Harzog I believe the switching of vendors can reduce this type of risk, considering the hack was accomplished through the supply chain process. Businesses need to find vendors that protect their supply chain with multiple layers of intrusion and anomaly detection stacks, which should be augmented by AI-powered networks, machine learning algorithms as well as human-supervised security protocols. Finding a vendor that maintains the end-to-end ownership of its supply chain process should be a necessity. There is also the conversation of products that run within the Windows environment verses Unix, which has it's advantages considering the hackers were able to take control of several windows tools via the hack.
@Jim Greenway So let's assume that you do all of the things that you listed above to protect your supply chain process. Do you then legally guarantee to your customers (via a contract with penalties) that you will not get hacked, and if you do then you will pay penalties to the customer as outlined in the agreement?In my opinion, solving this problem will either require the painful approach outlined directly above, or security solutions that customers can purchase and operate that are guaranteed to be able to detect and prevent these types of hacks.To the best of my knowledge, right now, there is no good answer.
IBM Netcool is a great alterative, also available as a SaaS solution from https://rufusai.com
Hi Henry,
Infosim, Stablenet is a very good alternative.
Regards,
Darryl Theron
@Darryl Theron What experience do you have with this tool? I'm looking for NCM alternative for a medium size network (3000 network devices like routers and switches. And what about this german company?
@reviewer775476 Hi, I have extensive experience with this solution, I am one of there partners and I am setting it up as an MSP.
I am looking for a tool or device that can be used to measure upstream bandwidth utilization. Any recommendations?
Thanks.
There are many network monitoring tools out there - some free, most paid. What software do you think is best for a large enterprise?