We’re excited to announce a new collaboration between Kentik and Red Hat. This partnership will enable organizations to enhance network monitoring and management by integrating network observability with open-source automation tools.
In this post, Doug Madory digs into the latest submarine cable failure impacting internet connectivity in Africa: the Seacom and EASSy cables suffered breaks on May 12 near the cable landing station in Maputo, Mozambique.
Traditional network monitoring systems can’t meet the dynamic demands of modern business networks. Modern NMSs built with SaaS-native architecture enable enterprises to deliver exceptional customer experiences, powered by scalable, high-performance, innovative monitoring.
In this post, I’m going to point out some of the opportunities you have in front of you not only because you now have Kentik NMS up and running, but more importantly, as a result of all the hard work you did to get here.
BGP Flowspec is one of the critical technologies gaining traction in DDoS mitigation strategies. In this article, Justin Ryburn outlines the adoption rates and best practices of this emerging and effective DDoS mitigation tool.
The time has come to switch to your new network monitoring solution. Remember, if an alert, report, ticket, or notification does not spark joy, get rid of it. We’ll cover how to spin up Kentik NMS and ensure you’re ready to sunset your old solution for good.
In this blog post, BGP experts Doug Madory of Kentik and Job Snijders of Fastly review the latest RPKI ROV deployment metrics in light of a major milestone.
Today’s evolving digital landscape requires both hybrid cloud and multi-cloud strategies to drive efficiency, innovation, and scalability. But this means more complexity and a unique set of challenges for network and cloud engineers, particularly when it comes to managing and gaining visibility across these environments.
Migrating network monitoring solutions is more than just a list of devices and technical requirements. It’s also about ensuring that all stakeholders are aligned - from team members to customers and everyone in between.
Network monitoring tools have a lot of moving parts. Those parts end up getting stored in a wide range of locations, formats, and even the ways various capabilities are conceptualized. With that in mind, we’re going to list out the information you should gather, the format(s) you should try to get it into, and why.