The importance of network visibility in response to the Internet of Things

The importance of network visibility in response to the Internet of Things

NMIS Dash FULL - 700

The Internet of Things (IoT) has led to many businesses capitalising on the computational potential and the increase in data available in everyday objects. The breadth of devices with internet connectivity has been increasing exponentially, CEB (CEBglobal – IoT Security Primer) suggests that the number of connections will grow from 6 million in 2015 to 27 billion by 2025. This increase has led to many new products and many new vendors operating in a market that can be vulnerable to catastrophic attacks. They continue by saying almost 40% of businesses believe that Poor Visibility and Understanding is their leading risk management challenge.

The underlying problem with a network that is considered to have poor visibility is the limited ability to discover everything that is connected to it. NMIS can manage any device that has an IP address, so if it is connected to your network, directly or indirectly, NMIS will know.

With the evolution of devices, there should be equal to greater sophistication in the understanding practices that are used to monitor devices. NMIS collects information from any device on your network and by using the ‘sysObjectId’ variable, it can attribute a vendor to the device from the Enterprise list. The list of vendors is continually expanding, you can peruse the most common list here. However, the true functionality of NMIS is the ability to control new vendors. This process is better explained – Here!

The increased visibility combined with custom thresholding using NMIS, there will be greater control over your network. Users of NMIS will be familiar with SNMP and device modelling, but there are more custom controls that are available. Watch Keith Sinclair (Opmantek CTO) present a webinar that walkthroughs the use of MIBs for custom function, device modelling and custom thresholding. This webinar is located – Here!

 

Here at Opmantek, we are constantly looking for new ways to help your workday. If you have any feature requests, webinar topics or ideas you would like to see get developed, don’t hesitate to reach out.

 

Opmantek Virtual Appliance is now even easier to use

Opmantek Virtual Appliance is now even easier to use

Opmantek’s Virtual Appliance has always been a feature-rich virtual machine. The appliance now supports Single Sign-On (SSO) across the Opmantek suite, this can increase your functionality and lower your stress. The release also has a new landing page that displays all the installed applications, it even notifies you when new application versions are released.

Setting up a Virtual Appliance for your network monitoring and auditing has never been simpler. Server Virtualisation has been known to increase productivity while reducing hardware and energy costs. Using a virtual appliance to discover, audit, manage, analyze and visualize your IT environment can save your business money while giving you more control and flexibility.

VM Any User - 700
Opmantek’s Virtual Appliance landing page, showing the applications installed and their versions.

 

The latest release is now a single .OVA file, this will benefit new users to the appliance by making the installation even simpler. The installation process is detailed here;

Getting Started Guide

 

And as always, we are constantly improving and fulfilling customer requests.

[CASE STUDY] – Managing BYOD with Open-AudIT

[CASE STUDY] – Managing BYOD with Open-AudIT

IAM, an international aid organization serving the people of Afghanistan was seeking a better method for capturing and managing the IT assets and other resources utilizing their networks.

The organization was challenged with hundreds of Afghan staff and around 40 expatriate volunteers and their families, many with their own devices (BYOD), accessing networks in remote rural locations with limited and intermittent internet accessibility and interrupted power supply.

The low cost and easy customization of Open-AudIT meant that IAM were able to audit large numbers of PCs by harnessing cloud storage offerings alongside Open-AudIT scripts.