Media releases are provided as is by companies and have not been edited or checked for accuracy. Any queries should be directed to the company itself.
  • 18 December 2012 11:02

How network managers can do more with less

Ipswitch, developer of WhatsUp Gold IT management software, offers advice

By Brian Jacobs, Senior Product Manager, Ipswitch, Inc.*

It’s a rare network manager indeed who is not familiar with budget constraints. But reduced spending – or static spending when the network is expanding – need not lead to slower networks, more devices dropping out, or increasing downtime.

For stressed out network managers, or IT departments under fire, here are five ways to stretch the budget:

Tip #1 Simplicity all around

From download to user experience to licensing, your IT management experience should be simple all around. Solutions that provide an integrated application with access to everything across your IT infrastructure from a single, intuitive Web console can save your IT department time and resources. There’s no need to buy separate solutions to manage your environment or to log into multiple consoles to get your job done.

Tip #2 Consider moving to an internal cloud!

Ipswitch has not bought a single piece of hardware in the years since we’ve moved to the internal cloud. Your first step in virtualisation is to decide which servers to move to the cloud. Usually, supplementary servers like DNS, domain controllers, DHCP, and file and print servers are good places to start because they don’t take full advantage of the hardware on which they exist. Web servers, mail servers and small databases are also good candidates.

More complex servers can be virtualised, but this must be planned carefully. Before virtualising any server, run a trending analysis and performance monitoring. You will need to measure processor use, memory use, storage, network traffic volume and disk I/O. Do not move an overloaded server to the cloud.

Tip #3 Find ways to troubleshoot and resolve issues faster

Industry studies show that 80 per cent of IT time and resources is spent on finding the problem, leaving only 20 per cent for fixing the issues. IT professionals who are running more than one network management solution will need to examine multiple reports and interfaces manually to correlate information across various types of metrics. This can substantially lengthen mean time to resolution (MTTR), making the job much more difficult and time consuming. Look for an infrastructure management solution that will let you discover, map, monitor and manage the network devices, servers, applications, virtual resources, port-to-port connectivity, configuration settings and network traffic from a single console.

Tip #4 Ensure 24×7 health, availability and optimal performance of infrastructure and applications

Performance monitoring should be a routine task. This seemingly unimportant activity can minimise risks and increase the likelihood that network issues and bottlenecks are discovered early. A network management solution with an all-inclusive console will make this job easier and more efficient.

Tip #5 Look for cost-effective solutions

Cost-effective solutions do exist, so IT professionals using one of the big four solutions might want to reconsider their options for the upcoming year. They can still have a solid IT management solution for a reasonable price, but might need to sacrifice the bells and whistles. Those considering open source solutions should realise that configuration can be a nightmare and the risks are high: vulnerability, scalability, liability and lack of tech support. But there is no need to panic, despite budgetary constraint. Simply weigh your options and find ways to do more with less.

* Ipswitch is represented in Australia and New Zealand by Digital Networks Australia. Contact CEO Martin Higham on +61 (0) 418 973 819. Email:

Submit a media release

Editor's Recommendations

Solution Centres


View all events Submit your own security event

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Media Release

More media release

Market Place