Press "Enter" to skip to content

Gartner Magic Quadrant for SIEM Products (2016, 2015, 2014, 2013, 2012, 2011, 2010)


Gartner defines SIEM as a technology that aggregates data produced by security devices, network infrastructure and systems, and applications. Products in the security information and event management (SIEM) market analyze security event data and network flow data in real time for internal and external threat management. They collect, store, analyze and report on log data for incident response, forensics and regulatory compliance. Vendors in this space are continually improving threat intelligence and security analytics. Companies are looking to adopt this…

Gartner Magic Quadrant for Network Performance Monitoring and Diagnostics (2017, 2016, 2015, 2014 )


According to Gartner, Network performance monitoring and diagnostics (NPMD) enable network professionals to understand the impact of network behavior on application and infrastructure performance, and conversely, via network instrumentation. Other users and use cases exist, especially because these tools provide insight into the quality of the end-user experience. The fast-growing network performance monitoring and diagnostics market is helping businesses support more complex environments and services through network visibility, performance issue detection and root cause analysis. Leaders in this industry are innovating…

Gartner Magic Quadrant for Data Center Infrastructure Management (DCIM) (2016, 2015,2014)


Data center infrastructure management (DCIM) tools monitor, measure, manage and/or control data center resources and energy consumption of both IT-related equipment (such as servers, storage and network switches) and facilities infrastructure components (such as power distribution units [PDUs] and computer room air conditioners). 2016 Based on Gartner report on Oct 2016, Nlyte Software, Emerson Network Power, and Schneider Electric continue to lead in the DCIM software market. Gartner Magic Quadrant for DCIM, Oct 2016

Cisco Wireless LAN Controller Redundancy Solutions: High Availability


There are two options for Cisco Wireless Controller redundancy solutions, either Backup Controllers or High Availability, depending on the firmware version of WLC’s, failover time requirement, and budget. Using Backup Controller method, a single controller at another location can act as a backup for access points when they lose connectivity with the primary controller in the local region. Centralized and regional controllers do not need to be in the same mobility group. You can specify a primary, secondary, and tertiary…

Cisco Wireless Controller 5508 Configuration Step by Step – Part 1 (CLI and GUI Access, Upgrade)


As the industry’s most deployed controller, the Cisco 5500 Series Wireless Controller provides the highest performance, security, and scalability to support business communications today and in the future. Cisco 5500 Series Wireless Controller • Support for up to 500 access points and 7000 clients • 8-Gbps throughput, eight 1 Gigabit Ethernet ports, with Link Aggregation Group (LAG) support • Standalone, rack-mountable appliance 5508 Front Panel Note: Service Port is the one above Redundancy Port. Relate Posts: Cisco Wireless Controller 5508 Configuration…

Gartner Magic Quadrant for Enterprise Network Firewall (2017, 2016, 2015, 2014, 2013, 2011, 2010)


Based on Gartner’s definition, the enterprise network firewall ” is composed primarily of purpose-built appliances for securing enterprise corporate networks. Products must be able to support single-enterprise firewall deployments and large and/or complex deployments, including branch offices, multitiered demilitarized zones (DMZs) and, increasingly, the option to include virtual versions for the data center. Customers should also have the option to deploy versions within Amazon Web Services (AWS) and Microsoft Azure public cloud environments. These products are accompanied by highly scalable…

Gartner Magic Quadrant for Unified Threat Management (2017, 2016, 2015, 2014, 2013, 2012, 2010,…)


Gartner defines the unified threat management (UTM) market as multifunction network security products used by small or midsize businesses (SMBs) (< 1000 employees). 2017 Gartner Magic Quadrant for Unified Threat Management (SMB Multifunction Firewalls) Not much changes from 2016. 2017 Gartner Magic Quadrant for Unified Threat Management (SMB Multifunction Firewalls)

Gartner Magic Quadrant for the Wired and Wireless LAN Access Infrastructure (2016, 2015, 2014, 2013, 2012, 2011, 2010)


Gartner’s Magic Quadrant for Wireless LAN Infrastructure has been released for a couple of years. This post listed all reports found from Internet since 2010. If you are not familiar with this research publication or Gartner, please see graphic below. Gartner places vendors in one of four quadrants – Leaders, Visionaries, Niche Players and Challengers based on their score system. Source: Gartner (July 2013) 2016 No changes on Leaders Quadrant. Fortinet got into challenger.

Using Artica Squid Open Source Project to Build Powerful and Safe but Simple to Use Proxy


Looking for a pre-installed GUI based Proxy for a while and found Artica recently. The feature is pretty attractive and GUI interface looks cool. What is Artica? “Artica Proxy is an appliance that claim to manage Squid-cache proxy with all features that Squid Cache provides.With the Artica Web interface you can monitor, manage get statistics of your proxy service. Artica Proxy provides ISOs in order to build a full proxy appliance without any technical skills. Artica Proxy allows to enable…

Configure Netflow on network devices for PRTG Netflow Monitoring


Netflow is a feature first introduced into Cisco routers and switches and then flow concept has been widely accepted by other network product vendors. Basically the network devices which support xflow feature can collect IP traffic statistics on the interfaces where xFlow is enabled, and export those statistics as xFlow records to remote defined xFlow collector. PRTG can use this NetFlow feature for detailed bandwidth usage monitoring and it also shows you: where your bandwidth is used who is using…