Best Practices In Choosing Network Monitoring Software

Blue Cross and Blue Shield of Hawaii (HMSA) found itself with a rapidly expanding network and data center. Our network devices, servers, and software were all growing in complexity and we knew that we would have to leverage technology to gain better control of our IT systems and network. In the past, we confronted the same dilemma that systems administrators in all IT organizations face: weighing the value of simple monitoring solutions versus expensive, feature-rich enterprise solutions that require labor intensive maintenance. We attempted to implement a large-scale system and network monitoring package from a major vendor but found the product was never fully implemented or adopted by the users because of its overbearing complexity. We then quickly implemented an inexpensive, low-end package that provided basic monitoring ? but lacked much of the deeper functionality our organization required, such as performance and application monitoring.

We knew we had to take a completely new approach. We decided to develop a set of best practices to ensure that new investments in system and network monitoring would be successful.

At the core of these best practices are two themes ? simplicity and cost-effectiveness HMSA's core best practices rest on five elements:

- Data center monitoring technology should be Web-based. Web-based technology simplifies rolling out the system, because no client-side application must be installed and upgraded. In addition, administrators can work from any location. Web-based user interfaces are also typically easy to learn, easing adoption and lowering training costs.

- Monitoring technology should be standards-based. HMSA chose to adhere to industry standards such as Simple Network Monitoring Protocol (SNMP) in order to simplify setup and installation and to avoid getting locked into one vendor's solution. Because SNMP is supported by almost all hardware and software vendors, monitoring a heterogeneous environment composed of many products is greatly simplified.

- Monitoring technology should be automation driven rather than consulting or manpower intensive. Expending costly and valuable IT resources on long-term enterprise software projects has proven risky and expensive.

- Data center operations should be viewed as a business process. IT departments tend to look at monitoring technology as something that displays trending graphs and sends alarms when there are network problems.

- Monitoring technology with simple license terms is preferable to products with many add-on or hidden modules. To control the costs of a monitoring implementation, a company needs visibility of up to five or 10 years of ongoing maintenance costs. Many enterprise software vendors' products are composed of many modules and components that have separate pricing models and require different training and support. HMSA believes that products with a number of components tend to be more expensive and complex to maintain over time.

We evaluated more than 15 vendors against these best practices and found that CITTIO's WatchTower monitoring platform was the closest fit. Equipped with WatchTower and our strong best practice approach, we successfully deployed enterprise-class system and network monitoring on 500 servers and network devices in a timely and cost-effective manner. Moreover, we are gaining the complete system control and network visibility our large, complex organization requires.

www.cittio.com

Oswego taxi to Midway ..
In The News:

Hackers and scammers keep looking for ways to break into your Facebook account. Kurt “CyberGuy" Knutsson has some tips to make sure your account is secure.
Kurt “CyberGuy" Knutsson shows you how to create group texts to reach multiple people at once — and also how to leave them if you get annoyed at the volume of interruptions.
Tax fraud is on the rise, and hackers are now using identity hijacking and artificial intelligence for tax returns in someone else's name to get a refund.
Toyota's Punyo soft robot mimics human behavior, using its chest, hips and arms — in addition to its hands — like a human to handle objects,
Hackers used third-party information to break into Roku accounts, according to the streaming company. Roku says it has secured affected accounts.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Kurt "CyberGuy" Knutsson explains the simple steps for setting a Wi-Fi hot spot on an Android. If you have internet on your phone, it's easy.
Dubai recently hosted the first jet suit race with a backdrop of skyscrapers, and one observer says it was straight out of a comic book.
Kim Komando introduces ways to keep you and your devices safe while traveling. The clever hacks mentioned can protect you from hackers and jackers.
TikTok CEO Shou Chew published a video Wednesday urging users to "protect your constitutional rights" against a bipartisan bill that would force China to divest from the app.
Tech guru Kurt "CyberGuy" Knutsson says you can never be too careful with tech passwords. He explains how to keep your information safe.
The Lighthouse in New Zealand rotates 360 degrees, constantly giving those inside different views around the clock. Built in the 1990s, it's up for sale.
High school students in Colorado are learning how to design their own AI model projects, including cameras for self-driving cars and apps that can teach other languages.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Vehicles collect sensitive personal information, which is used to set auto insurance rates. That's partly why auto insurance premiums are rising.
Honda's Uni-One is a hands-free electric mobility device that can reach speeds of 3.7 mph and support a user weighing up to 242 pounds.
Kim Komando puts three AI chatbots head-to-head to decide which is the best assistant for modern problems. Compare Google Gemini, ChatGPT, and Perplexity.
To safeguard personal information on iPhones, users can employ built-in security measures and iCloud Keychain for enhanced privacy. Kurt “CyberGuy" Knutsson shows you how.
Kurt “CyberGuy" Knutsson introduces you to the City Transformer’s CT-2 electric car, which can seamlessly transition from 8 feet wide on the road to a compact 3 feet for parking.
Hackers are always looking for new ways to trick targets into downloading malware. Now, they're after cryptocurrency folks via Calendly. Kurt “CyberGuy" Knutsson has the details.
Kurt “CyberGuy" Knutsson reveals how the Microlino Lite, a compact and eco-friendly vehicle, tackles city traffic congestion with its chic design and small dimensions.
A new funeral scam targets surviving family members of those who recently died. Scammers reach out to the survivors and pose as funeral home officials.
Merlin Labs' autonomous pilot could soon hit the commercial airways and may help alleviate a looming pilot shortage, according to CEO Matt George.
There's a simple way to check your subscriptions on an Android and cancel them. Tech guru Kurt "CyberGuy" Knutsson explains how it is done.
Hackers use pirated software to target macOS, Android and Windows devices in search of stealing cryptocurrency, according to Kurt "CyberGuy" Knutsson.

The Dreaded Paper Label - Should it be Used?

While paper labeling CDs and DVDs may appear to be... Read More

Microsoft CRM and Great Plains Implementation: Freight Forwarding Business Automation Example

Microsoft Business Solutions offers several ERP applications: Great Plains, Navision,... Read More

Microsoft Great Plains Customization Tools ? Overview

Former Great Plains Software Dynamics/eEnterprise, and currently Microsoft Business Solutions... Read More

Will Adobe Manage to Replace Industry Work Horse Quark Express by Giving Adobe InDesign for Free?

And kill the best layout software in the process of... Read More

Software For Your Hard-Drive

All your software is stored on a hard-drive. But how... Read More

Run Your Own Search Engine

Our hosted solution allow you to run your own search... Read More

Microsoft Navision Customization Upgrade ? Tips For Programmer/IT Specialist

Currently Microsoft Business Solutions is on the way of creating... Read More

Software Process Improvement -A Successful Journey

Background: For many organizations like ours, the interim target of... Read More

Microsoft Great Plains in Construction & Building ? Implementation & Customization Highlights

Microsoft Great Plains could be tuned and setup to fit... Read More

Microsoft Business Solutions VAR/Partner Selection ? Overview for IT Director/Manager/Controller

Microsoft Great Plains and Microsoft CRM become more and more... Read More

Crystal Reports - Microsoft SQL Server

Microsoft SQL Server is the leader for inexpensive and middle... Read More

Anti-Spyware Protection ? Holes in the Shining Armor

Looking at all the ads which promise to get rid... Read More

String in Java

Handling character strings in Java is supported through two final... Read More

Microsoft Small Business Manager eCommerce ? Overview

Microsoft Business Solutions Small Business Manager is scaled down Great... Read More

Great Plains Dexterity: Customizations & Source Code Programming

Great Plains Software Dynamics, Dynamics C/S+, eEnterprise were written on... Read More

What You Should Know About Installing Screensavers

Do you remember that frustrating feeling when you find an... Read More

Groove Network. Are you in it?

If you are in a business that passes documents around... Read More

Lotus Notes Domino and Web: Application Development ? Tips for Programmers

Beginning with Domino version R4 it has integration with the... Read More

5 Easy File Management Tips in Microsoft Word

How many steps does it take you to locate and... Read More

Benefits of Shareware

Shareware has been fighting the stigma of being misunderstood for... Read More

Microsoft Great Plains: Offshore Customization & Development ? Overview for Consultant

When you visit department stores and see that majority of... Read More

How to Tell You Have Spyware, Ad-ware or Viruses

Usually, the easiest way to tell you have spyware is... Read More

Microsoft Great Plains Logistics & Warehouse Management ? Implementation & Customization Highlights

Logistics automation is often considered as barcoding extension to Sales... Read More

Fast Car Knoppix

Small can be beautiful! Working with Knoppix for the past... Read More

Selecting Microsoft Great Plains Partner/VAR/Reseller: ERP Implementation & Customization ? Overview

In the case when you represent mid-size or mid-size-to-large business,... Read More

shuttle from Midway Morris ..