Search This Blog

Monday, June 22, 2009

How to dramatically cut costs on network performance monitoring

The Great Virtualization Management and Migration Tools Race; Buying Software to Manage IT Finances
Network World logo

IT Best Practices

NetworkWorld.com | Update Your Profile


Sponsored by Juniper Networks
rule

Is Your Company Prepared for the Unexpected?
In this live webcast, June, 25, 2009, you'll hear how to prepare the network now to seamlessly continue business operations during a major crisis, as well as a case study of an organization that has implemented a business continuity network plan.

rule

Spotlight Story
How to dramatically cut costs on network performance monitoring

The economic downturn and reduced IT budgets are forcing many network managers to look for alternative (read that as "cheaper") products and solutions for managing their networks. If you find yourself in this boat, then read on about a performance and availability monitoring solution that competes with the enterprise products from companies such as CA, IBM, HP and BMC Software. At the same time, this solution is saving its users hundreds of thousands and even millions of dollars. Read full story

Related News:

The Great Virtualization Management and Migration Tools Race
Third-party virtualization companies appear to be taking advantage of what are traditionally slow news weeks in the technology business by rushing out a host of products designed to make virtualization infrastructures more manageable, cheaper, and easier to squeeze into previously unappreciated corners of the IT world.

Buying Software to Manage IT Finances
Can a software purchase now save money in the long run for the IT group? Denise Dubie talks with HP's Ken Cheney about the company's new IT financial management software, services and strategy. (9:32).

Identity management defined
There's an important new document available in the field of "user-centric" identity, and it's one I think we should all read.

Working with consultants
This is the second in a series of four columns on working effectively with consultants. When the client and consultant are discussing problems and how the consultant could help, both parties must be conscious that a consultant always has two allegiances: to the manager hiring her and to the firm employing the manager. You must define the scope of the consulting assignment so that the consultant can in fact legitimately tackle the task. For example, it would be pointless for a local manager to request assistance in implementing a security solution requiring corporate-wide changes. Such a project would be beyond the manager's scope. The converse problem is consultants, especially those from large firms, which use templates to prepare consulting reports where string variables are modified to include details from the client firm but which have little research and less analysis of the specifics of the client's situation and needs. It is an excellent practice to ask for a couple of sample anonymized reports from consultants before accepting their proposals; finding identical language in substantive sections of the two reports should give you pause. As you evaluate potential consultants, look for those who can state their understanding of your problems clearly. I am fond of the phrase, "Let me see if I have understood" because it's a chance to test my perceptions against those of the client. Ask your candidates to tell you how they see your situation and to define the problems they perceive. Be especially attentive to consultants who challenge your initial views of your problem: you want consultants who are able to think independently and bring their expertise to bear on your problems, not sycophants who are willing to hide their knowledge and their disagreement to get the contract. Just as important, you want consultants who can articulate their views clearly and non-aggressively. You need a reasoned exchange of views from which to learn, not a boxing match where winning is the object. Sometimes consultants are (foolishly and improperly) asked by managers to produce support for a predefined set of conclusions as part of an internal political battle; consultants must be clear that their report may very well disagree with preconceptions. Indeed, consultants should be chary of accepting such assignments: they can be the kiss of death, since providing a professional result that conflicts with the client's predetermined outcome can result in slanderous comments in the community, yet unprofessionally kowtowing to unreasonable demands can justifiably lead to a tarnished reputation, litigation for malfeasance, and perhaps expulsion from professional societies. In the next column, I'll look at relating to consultants for effective use of your time and money. M. E. Kabay, PhD, CISSP-ISSMP, specializes in security and operations management consulting services. CV online.

June Giveaways
Cisco Subnet and Microsoft Subnet are giving away training from Global Knowledge to two lucky readers and 15 copies each of books on IPv6 security, the Cisco Secure Firewall Services Module, and Active Directory Domain Services 2008. Deadline for entries June 30.

Network World on Twitter? You bet we are


VMware's vSphere reviewed
vSphereWe found 5 things to love and 5 things to hate about VMware's vSphere.

Take the quiz
IT quizAre you a net know-it-all? Prove it.

Get the Most from Exchange 2007
Read this whitepaper to discover the changes that have the greatest impact on storage and a reexamination of best practices for designing Exchange storage.
Get all the details today.


 

June 22, 2009

TOP STORIES | MOST DUGG STORIES

  1. Hackers dissect Palm Pre, webOS
  2. Nine Ball attack strikes 40,000 Web sites
  3. Apple's window to gain PC market share is narrowing
  4. Apple delays iPhone 3.0 launch
  5. Ex-Googlers behind new security service
  6. BlackBerry Tour smartphone announced
  7. Gadgets for any kind of techie Dad
  8. Data center derby heats up
  9. IT job market update: Hiring stalled, salaries slashed
  10. Google urged to beef up Gmail security

Symantec Protection Suite: Top 10 Benefits
Completely protect, easily manage and automatically control your most crucial business assets. Download this whitepaper today and discover - from security and recovery to savings and compliance - the Top 10 reasons why Symantec Protection Suite offers unparalleled security.
Learn More



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: