Simple Networking Tools Ease IT Pains

...

In this informative webinar on August 30th you will hear security experts discuss practical ways t

Forget the bells and whistles of powerful networking tools. When overseeing clients' networks, some IT pros insist that simpler is better.

For Elijah Holiday, network administrator at Singhs Networking and Systems in Piscataway, N.J., simple tools are more valuable than powerful ones.

In a phone interview, Holiday described how for the past three months he's been using a set of networking tools released by Spiceworks on Wednesday. The small networking company he works for serves small business clients, often with five to ten employees, and tries to keep costs down.

Holiday said he started with the Subnet Calculator, a web-based tool that accepts a range of IP addresses and generates a list of subnets, a necessary step when dividing networks.

The tool, Holiday said, was "an easy way to get network information."

[See 10 Hot Security Technologies Enterprises Need Now.]

While Holiday has used more powerful networking tools like Wireshark and Microsoft Network Monitor, the simplicity of the Spiceworks tools fit his company's needs better. "Spiceworks works better for smaller business clients," he said. "...It's just lighter on resources."

Holiday also expressed appreciation for the low learning curve of the tools and for having all the tools in a single location, which isn't always the case for apps on specific machines. "Instead of setting up different tools at each client, there's one login where I can see everything," he explained.

Spiceworks, a social network, marketing channel, and service provider for IT professionals, also introduced several other tools: Blacklist Check and IP Reputation, IP Lookup, and Port Scanner and Tester. These web-based apps can help IT professionals analyze IP addresses, spot network vulnerabilities, and understand their networks.

Blacklist Check and IP Reputation rely on AlienVault's Open Threat Exchange to determine whether an IP address or hostname has been identified as malicious. This can be useful for spotting external threats or shining a light on internal practices that hinder email deliverability.

IP Lookup examines IP addresses and network hostnames to ferret out details about domains, the organization or owner behind the domain, and the place of origin. Such information can be useful for firewall configuration and limiting network access when IP addresses originate in countries deemed to pose a cyber-security risk.

Port Scanner and Tester will find open ports associated with a specific IP address, which can inform firewall configuration and help with network settings like port forwarding.

Holiday said he's been using these tools too, to understand more about where spam email is coming from and to make sure that when clients use telnet, the network ports used get closed. "They let us be a little more proactive," he said.

Categories
APPLICATIONS
0 Comment

Leave a Reply

Captcha image


RELATED BY

  • 5300c769af79e

    LG Hosting Event on August 31, Likely for the V30

    A couple of weeks ago, we heard a rumor suggesting that LG may unveil the V30 as early as late August or September, during IFA, a tech conference in Berlin.Today, the company confirmed that they are indeed hosting an event at IFA and the “Save the Date” has a big “V” across it.
  • 5300c769af79e

    OnePlus 5 is Now Available for Purchase

    After an initial pre-sale, the OnePlus 5 has returned and is once again available for purchase.You can buy the phone in Slate Gray with 64GB storage and 6GB RAM for $479 or in Midnight Black with 128GB storage and 8GB RAM for $539.
  • 5300c769af79e

    Android Auto Supports "OK Google" Hotword, Finally

    Should you update the Android Auto app from Google Play, you will notice a new feature, one you might have expected to be available a long time ago, in a galaxy far, far away.I’m speaking, of course, about the “OK Google” hotword command.
  • 5300c769af79e

    Rapid Tech Change Challenges IT Leaders

    Agility is the name of the game for today's IT organizations, but keeping up with the rapid pace of change is difficult.Gone are the days when IT procured and managed all of an organization's technology.