Search This Blog

Wednesday, April 29, 2009

More ways to manage IP addresses

SolarWinds adds IP address management to its Orion suite
Network World logo

Network/Systems Management Alert

NetworkWorld.com | Network Management Research Center | Update Your Profile


Sponsored by APC
rule

Optimizing the Data Center
The Editors of Network World present this Executive Guide: Taking Virtualization Up a Notch. Read it and find out what you need to know about virtualization as it creeps into every corner of your data center. Learn More!

rule

Spotlight Story
More ways to manage IP addresses

Denise Dubie By Denise Dubie
IP address management continues to challenge enterprise IT managers who often find themselves stuck between having to save cash and needing a better way to track core network services. Read full story

Denise Dubie is senior editor with Network World.

Related News:

Editor's note: We will be changing how we send out Network World newsletters over the next few weeks. To ensure future delivery of your newsletters, please add nww_newsletters@newsletters.networkworld.com to your e-mail address book or 66.186.127.216 to your white-list file. Thank you.

How do you manage IP addresses? Typically pushed to the backburner, IP address management (IPAM) upgrades in enterprise IT departments might have gotten some attention last year, according to recent survey results.

Tools cure IP address management headaches IP address management tools aren't sexy, but they can certainly take the tedium out of the necessary and difficult task of tracking IP addresses and DNS names across an enterprise network.

How we tested IP address management tools The Proteus/Adonis, VitalQIP, and IPControl product have professional services included in their prices. We scheduled a time for a representative professional engineer to come to our lab and set up their product. Only one company was allowed at a time. With EasyIP, we set up a Windows Server 2003 machine with IIS and .Netv1.1 and then installed the EasyIP software. The next step was to populate the product’s database with the test data which we accomplished through the data import/export test.

Managing IP addresses with free tools Few people would argue the importance of IP addresses to network operations, but many don't make managing them a priority in their environment, especially in tough economic times.

IP address management projects not a priority for IT Corporate networks depend on IP to run smoothly, but that doesn't mean projects designed to streamline IP address management (IPAM) processes get top priority in most IT shops, survey results reveal.

Justifying the payoff of IP address management IP address management (IPAM) is one of those areas that continues to grow in importance as TCP/IP becomes the de-facto standard for corporate networks. It's also an area that is just recently starting to see an appropriate level of automation. A new paper by Infoblox, available here, examines this need for automated management in detail. According to Greg Lanier, Infoblox director of marketing communications: "It's kind of mind blowing that most people are still doing this on spreadsheets. You shouldn't be managing some of your most critical network assets with Excel."

Is the Internet Ready for a Pandemic? As the dreaded word "pandemic" tops this week's headlines about the swine flu virus spreading around the globe, many businesses are dusting off emergency plans for employees to work from home and schools are poised to send students home. If this turns out to be a full-fledged pandemic, not only will people fall ill, the Internet will too.

More Regarding H-1B Visas In her Microsoft Subnet blog Kerrie Meyler continues her writing about H1-B visas. She cites several interesting articles on the topic.

April giveaways galore
Cisco Subnet
and Microsoft Subnet are giving away training courses from Global Knowledge, valued at $2,995 and $3,495, and have copies of three hot books up for grabs: CCVP CIPT2 Quick Reference by Anthony Sequeira, Microsoft Voice Unified Communications by Joe Schurman and Microsoft Office 2007 On Demand by Steve Johnson. Deadline for entries April 30.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Evolution of Ethernet
Evolution of Ethernet From 3Mbps over shared coax to 40/100Gbps over fiber…and beyond.

Apple iPhoneys: The 4G edition
Apple iPhoneys: The 4G editioniPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.

Sponsored by APC
rule

Optimizing the Data Center
The Editors of Network World present this Executive Guide: Taking Virtualization Up a Notch. Read it and find out what you need to know about virtualization as it creeps into every corner of your data center. Learn More!

rule

Network World's IT Resource Library
Whether you're looking to gear up on one specific topic or you're trying to stay current on several areas, Network World's resource library has what you're looking for. Our comprehensive collection of resources will make your job easier.
Visit Now


DNS news and tips
DNS is not secure and is extremely vulnerable. DNS is at the core of every connection we make on the Internet. While some servers are indeed vulnerable, because of inadequate management or knowledge, the real threat is from the protocol itself and how data is easily subverted or faked as it moves around the internet.
Receive the latest DNS news and tips

 

04/29/09

Today's most-read stories:

  1. Military enlists open source community
  2. Seven burning security questions
  3. How Bluetooth got as fast as Wi-Fi
  4. BizTalk Server 2009 ready for the public
  5. Some IT skills see pay hikes during downturn
  6. JTAG Hacking
  7. 12 killer freebie SharePoint add-ons
  8. IBM to resell Brocade's Foundry switches
  9. The biggest losers in the Oracle, Sun deal
  10. The downfall of Sun
  11. Notebook replaces trackpad with LCD panel


Network World on Twitter: Get our tweets and stay plugged in to networking news


EMA: Refining privilege access security.
Close the security gaps in high-privilege access control and authentication by selecting the right security products for the job. This whitepaper, "Resolving the Privilege Management Paradox," details how. EMA outlines how to find products that offer strong shared access management, better control and clear visibility and multifactor authentication.
Click to download.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: