PRTG Network Monitor (HPB-PRTG)
News From Paessler
PRTG version 22.2.77 is now available in the stable release channel and comes beside a new Python distribution, a security improvement for maps and an update for all language files with many changes behind the scenes.
Acurus is an Australian company that provides technology services for some of the country?s largest and most successful organizations in the utilities, health, government, and retail sectors, including Officeworks, Bakers Delight, Red Energy, Hume Bank, Paccar Australia, The Victorian Department of Health, as well as several Indigenous cooperatives.
Changing the Paessler PRTG interface for 500,000 users: how to take the user experience to the next level
With around 20 years on the market, Paessler PRTG is a monitoring product that has accumulated a large fan base over the years. The first version of PRTG Network Monitor still focused on pure ping and traffic monitoring and had a very simple Windows-based interface. Following the general trend, the conversion to a web server architecture took place in 2007. At that time, the web interfaces of many other products on the market offered only an additional, feature-reduced view, mostly in a read-only mode. Not so with us: For PRTG, from that time on, the web interface was the main interface with all functionality available. It is the first place users log in to interact with the product.
Like the IT of many major companies, Foxtons had various tools in place running in separate silos. It naturally wanted a centralized solution to unify the monitoring of certain aspects of its IT environment. This was one of the major challenges that the IT team was facing before contacting Paessler.
OPC UA is a widely adopted standard in industrial environments. Despite this, there are still problems with its security. This was clearly demonstrated in April 2022 when two hackers at Pwn2Own (a hacker conference that offers prizes to contestants who can breach Industrial Control Systems) gained access to software that runs many of the world?s power grids. And of course, if two ethical security hackers can get this kind of access to critical services within two days, then so can foreign intelligence agencies.
If I asked you to name a technology that?s vital to today's ?connected everything? world, but originated in the 1940?s, I bet not many of you would respond with ?APIs?. Although the term Application Program (without the -ing suffix) Interface wasn?t coined until 1968, the concept of sharing data between computer programs originated with the development of a modular software library for the EDSAC computer in the late 1940s.
... hooold on, we've been over something similar before, haven't we? And indeed, the observant reader will recall our article published in the midst of the Corona pandemic, describing how we allowed all employees to work either from the office, from home (or, conveniently, any other location), or flexibly switch between the office and home. And not just for a month, half a year, or until the pandemic situation is over, but for good. Sorry Elon, this stuff actually works. Since we uphold the principle that the health of our employees is our top priority, office visits still require special conditions; this includes rapid tests and the wearing of a mask. But now that the fog is lifting and we are beginning to see a glimmer of hope for a true new normal, we have decided to fundamentally change our office experience as well.
With so much media and industry attention on ransomware, phishing attacks, and cyber security in general, it can be easily forgotten how important physical security can be for critical IT infrastructure. All the CVE patches in the world are of no use if your servers are stolen, flooded, or incinerated. Ensuring stable and controllable environmental conditions for vital data center equipment is usually the responsibility of the facilities management team. They are the ones who have to make sure that power always gets to where it is needed when it is needed, that cooling and waste heat management is handled as cost effectively as possible, and that physical access to systems is limited to people who have a valid reason.
The Industrial Internet of Things is an integral part of Industry 4.0: the modern factory has IIoT sensors in just about every nook and cranny. Whether it?s a machine on the factory floor or an HVAC system, there is a sensor that can monitor it. And, just like other components in your industrial infrastructure like OT and IT, these sensors need to be monitored to make sure they?re up and running and collecting data. We?ll take a look at how to monitor IIoT sensors, but let?s first take a look at what we mean by the IIoT, what the use cases for IIoT sensors are, and the typical architecture.
Paessler PRTG provides three native Redfish sensors (the Redfish Power Supply sensor, the Redfish System Health sensor, and the Redfish Virtual Disk sensor) which I recently introduced in this article:?? Let?s talk about sensors! Monitoring with PRTG Redfish sensors.Even though the Redfish Virtual Disk sensor is currently still in beta, I encourage you to use and test these sensors. In this article I will show you what Redfish is and how you can add these sensors or even replace your IPMI sensors in PRTG.
Who's there? Just another day of companies telling you how much they appreciate you. Thing is, we at Paessler believe in actions instead of mere words. We value you so much that we provide you with year-round content that entertains, inspires, supports and helps you in very tangible ways.
We believe monitoring plays a vital part in reducing humankind's consumption of resources. Monitoring data helps our customers save resources, from optimizing their IT, OT and IoT infrastructures, to reducing energy consumption or emissions. For our future and our environment. We would like to share an exciting use case with you, in which one of our customers reports on the measures he has taken to save energy in his private household. These and similar measures can also be implemented in a larger, professional environment.
The Cisco Meraki network management solution is used in many companies of all sizes. Users appreciate the simple design as well as the automatic integration of the latest technology through automatic updates. Another highlight is the scalability and ease of use, which make this an ideal solution for companies with different network specifications. The Cisco Meraki IT portfolio ranges from security cameras and switching solutions to enterprise mobility management (EMM) and wireless capabilities.
Since you already know how much we love sharing case studies with you, let's get to the point quickly. This time, we show you how The Student Hotel benefits from intuitive IT monitoring. Paessler PRTG is a powerful and easy-to-use solution, which is suitable for businesses of all sizes. In case you prefer PDFs instead of blogs, we have just the thing for you: The linked PDF can be found on this use case page. The IT team of The Student Hotel monitors all branches in the Netherlands and abroad from its headquarters in Amsterdam and from home With the implementation of PRTG, The Student Hotel (TSH) has real-time insight into the availability and capacity of systems and applications. Henk Jan Boer, Director of IT Infrastructure and Support at TSH, selected PRTG as the solution of choice to match TSH?s growth and ambitions. The scalable, flexible and affordable software now makes sure TSH?s systems can be monitored real-time, from the office or even from home.
In large industrial companies, IT administrators deal more with the OT world than ever before. From looking after the industrial Ethernet through to ensuring the OT supporting infrastructure is healthy, the role of the IT administrators in these organizations has expanded. The driving force behind this growing role: convergence. The IT and OT areas have become more connected so that data can flow from the factory floor all the way to the ERP or cloud systems.