Network modernization requires flexibility

By | October 18th, 2016|Blog|

For governmental (and some commercial too!) IT groups, network modernization takes more than incremental improvements, according to the Social Security Administration's IT chief. SSA CIO Rob Klopp told an AFCEA audience that technology is advancing too rapidly to catch up a little at a time. "You will not be able to take a 20-year-old technology and [...]

Local Management Software v5.3 Available

By | February 25th, 2016|Blog|

The latest version of the Uplogix Local Management Software (LMS) is now available. At Uplogix we don't name our releases after candy or big cats; we just give them a nice wholesome number. Not a whole number, there are decimals, but you get the point. LMS v5.3 brings new functionality designed to improve visibility of large [...]

Comparing apples, oranges and out-of-band

By | June 26th, 2015|Blog|

A week ago we were at Cisco Live in San Diego with 25,000 IT friends sharing the sea breeze, certification tests, Aerosmith and the World of Solutions -- where a couple hundred Cisco partners vie for the attention of Cisco's faithful. At the Uplogix booth it was four days of continuous conversations with a common [...]

Open vs. closed appliances in your network

By | March 23rd, 2015|Uncategorized|

When it comes to putting an appliance in your network for out-of-band management, you want to think carefully about whether that appliance is based on an open or closed platform. It might just be the difference between locking up network security and being open for business for hackers. A Linux platform lends itself to building [...]

Cisco survey: Security holes unpatched

By | January 28th, 2015|Uncategorized|

The release of Cisco's Annual Security Report shows that corporate security teams are not patching holes in their software or security tools. Less than half of the respondents at 1,700 companies in nine countries use standard tools for ensuring they are running the latest versions of software. This study comes in the year that saw [...]

Config errors better than hackers?

By | January 28th, 2015|Uncategorized|

The Facebook downtime event on January 27th, where an hour-long outage at Facebook cut off access to critical status updates worldwide in addition to Instagram posts and Tinder hook-ups, shows the sensitivity of large organizations to public perception of hacking threats. The Lizard Squad hacking group, which apparently took control of the Malaysia Airlines website [...]

Better security through config management

By | October 24th, 2014|Uncategorized|

Gartner says that the average firm makes 10,000 changes annually to its IT environment. It's no wonder change management can make or break your network. Literally. Security patches, interdependencies among various components of your network, and the ability to recover from a disaster are driving factors to companies attempting to create a Configuration Management Database [...]

An awareness month you should celebrate all year

By | October 1st, 2014|Uncategorized|

In the month dedicated to more awareness topics than any other, you won't want to miss out on National Cyber Security Awareness Month (NCSAM). While you won't likely see sporting events with athletes sporting uniform accessories with neon green of NCSAM's logo (well, maybe the Seahawks...), you might be surprised to know that this year [...]

Taking Network Management Local to Enable REAL Automation

By | July 30th, 2014|Uncategorized|

Despite decades of advancements in network speed, reach and security, the management of network devices is still a hands-on task. It involves reactive and often tedious actions open to human error. Traditional Network Management tools rely on the network itself to manage critical devices. This dependence on the network to manage the network is a [...]

Will Google drive your car before you automate network management?

By | July 23rd, 2014|Uncategorized|

The reason people don't trust network automation is that it relies on the network itself to manage the network. Like the sensors atop a driverless car with the processing and brains in the trunk, Uplogix deploys in the rack with network infrastructure for network-independent monitoring and management, and tighter security. For years, the answer to [...]