Endpoint Agent monitors end user experience from employee laptops and desktops to understand web performance and Internet connectivity of any browser-based service.
Endpoint Agent Part 3: LAN, Wireless, Gateways and ProxiesThousandEyes
Learn to use Endpoint Agent to identify both isolated and systemic issues in every part of your LAN, from wireless connections to gateways and proxies.
Internet Outage Detection allows users to rapidly detect both network and routing outages and understand their scope and likely root cause. Explore data from major outages and learn to use Internet Outage Detection to diagnose issues and their impact. See the webinar recording at https://www.thousandeyes.com/resources/diagnosing-internet-outages-webinar
Monitoring End User Experience with Endpoint AgentThousandEyes
Endpoint Agent monitors end user experience from employee laptops and desktops to understand web performance and Internet connectivity of any browser-based service. Learn to troubleshoot end user issues and use the newest Endpoint Agent features.
Endpoint Agent Part 2: Monitoring SaaS Apps from AnywhereThousandEyes
Endpoint Agents monitor application experience and network connectivity of SaaS apps like Salesforce and Office 365. Performance data is collected directly from employee laptops and desktops and aggregated so you can understand real-time performance, long-term trends and individual user issues. In Part 2 of this webinar series, we’ll share:
* Metrics you can gather on SaaS performance
* How to report on aggregate performance for an app or location
* How to troubleshoot both office and remote users
Troubleshooting Remote Workers and VPNsThousandEyes
Your sales team is in the field, executives are on the road and other employees are often working from home. This means that your help desk and ops teams spend hours validating problems or leave unsolvable tickets open. Endpoint Agent continuously collects performance data about internal or SaaS applications that are used by your remote workers, including metrics about Wi-Fi and VPN connections. This webinar covers how monitoring remote employee connectivity can boost productivity and how Endpoint Agent measures performance through VPNs and on remote networks.
Reverse Path Visibility with Agent-to-Agent TestsThousandEyes
This document discusses reverse path visibility using agent-to-agent tests in ThousandEyes. It describes how agent-to-agent tests provide bidirectional path visibility across internal and external networks to accurately monitor the forward and reverse paths. This gives more precise diagnostic data to isolate network faults. It also explains how enabling NAT traversal allows agent-to-agent tests to work across NAT devices without requiring inbound port forwarding rules.
2016 Internet Outages: Trends, Insights & Analysis ThousandEyes
The document summarizes major internet outages that occurred in 2016, including DDoS attacks, infrastructure overload from peak traffic, and outages caused by fragile infrastructure and lack of redundancy. Some key trends identified are that the internet is vulnerable to DDoS attacks and failures of critical infrastructure like DNS. Planning and testing are important to avoid outages from overloaded networks or misconfigurations. The document recommends monitoring critical services, building resilient networks with redundant infrastructure, and being proactive in testing and identifying bottlenecks. It includes demonstrations of outages from a DDoS attack on Dyn, infrastructure overload during a Powerball lottery, and a route leak impacting Amazon traffic.
Endpoint Agent Part 3: LAN, Wireless, Gateways and ProxiesThousandEyes
Learn to use Endpoint Agent to identify both isolated and systemic issues in every part of your LAN, from wireless connections to gateways and proxies.
Internet Outage Detection allows users to rapidly detect both network and routing outages and understand their scope and likely root cause. Explore data from major outages and learn to use Internet Outage Detection to diagnose issues and their impact. See the webinar recording at https://www.thousandeyes.com/resources/diagnosing-internet-outages-webinar
Monitoring End User Experience with Endpoint AgentThousandEyes
Endpoint Agent monitors end user experience from employee laptops and desktops to understand web performance and Internet connectivity of any browser-based service. Learn to troubleshoot end user issues and use the newest Endpoint Agent features.
Endpoint Agent Part 2: Monitoring SaaS Apps from AnywhereThousandEyes
Endpoint Agents monitor application experience and network connectivity of SaaS apps like Salesforce and Office 365. Performance data is collected directly from employee laptops and desktops and aggregated so you can understand real-time performance, long-term trends and individual user issues. In Part 2 of this webinar series, we’ll share:
* Metrics you can gather on SaaS performance
* How to report on aggregate performance for an app or location
* How to troubleshoot both office and remote users
Troubleshooting Remote Workers and VPNsThousandEyes
Your sales team is in the field, executives are on the road and other employees are often working from home. This means that your help desk and ops teams spend hours validating problems or leave unsolvable tickets open. Endpoint Agent continuously collects performance data about internal or SaaS applications that are used by your remote workers, including metrics about Wi-Fi and VPN connections. This webinar covers how monitoring remote employee connectivity can boost productivity and how Endpoint Agent measures performance through VPNs and on remote networks.
Reverse Path Visibility with Agent-to-Agent TestsThousandEyes
This document discusses reverse path visibility using agent-to-agent tests in ThousandEyes. It describes how agent-to-agent tests provide bidirectional path visibility across internal and external networks to accurately monitor the forward and reverse paths. This gives more precise diagnostic data to isolate network faults. It also explains how enabling NAT traversal allows agent-to-agent tests to work across NAT devices without requiring inbound port forwarding rules.
2016 Internet Outages: Trends, Insights & Analysis ThousandEyes
The document summarizes major internet outages that occurred in 2016, including DDoS attacks, infrastructure overload from peak traffic, and outages caused by fragile infrastructure and lack of redundancy. Some key trends identified are that the internet is vulnerable to DDoS attacks and failures of critical infrastructure like DNS. Planning and testing are important to avoid outages from overloaded networks or misconfigurations. The document recommends monitoring critical services, building resilient networks with redundant infrastructure, and being proactive in testing and identifying bottlenecks. It includes demonstrations of outages from a DDoS attack on Dyn, infrastructure overload during a Powerball lottery, and a route leak impacting Amazon traffic.
Applications increasingly rely not only on internal enterprise networks, but also on the Internet, for high levels of end user performance. The ThousandEyes platform helps you to deploy monitoring points, analyze network data and collaborate with external vendors to achieve superior application delivery for your employees and customers. In this presentation, we demo how to collect performance data across enterprise, WAN and ISP networks, and analyze metrics and network topologies to find root causes. Watch the full presentation with interactive demo here: https://www.thousandeyes.com/lp/getting-started-webinar
Measuring and Troubleshooting Performance of Global Data Centers at ServiceNowThousandEyes
Geoff Wade, Senior Network Engineer, presents how ServiceNow relies on ThousandEyes Cloud Agents to provide insights into datacenter availability and reachability along with diagnostic data for ISP outages.
ISP Connectivity Webinar: No Longer a Black BoxThousandEyes
Your Internet Service Providers are critical to keeping your data centers and offices connected. Yet you may not have much insight into the performance of ISP links outside your network. ThousandEyes maps network topologies across ISP networks, measures performance of data center ingress and egress, and captures BGP routing changes across all relevant prefixes.
In this webinar, we’ll share how to:
*Get visibility into ISP environments in just minutes
*Associate path and route changes to app and network performance
*Share data on specific problem interfaces and links with your ISPs
Enterprise Agents: Deployment Best PracticesThousandEyes
This document provides best practices for deploying ThousandEyes Enterprise Agents within an organization's network. It discusses the different deployment models for the agents including virtual appliances, containers, and physical installers. It recommends deploying agents in data centers, branch offices, and remote locations to monitor WAN links, SaaS applications, and voice/web services. Guidelines are provided around choosing appropriate tests based on agent resources and setting up agents behind NAT or proxies. A demo is also offered to illustrate installing and running tests with the Enterprise Agents.
Learn how to monitor the performance of IPv6 networks, including DNS resolution, IP paths, loss and latency, and BGP routing. View the webinar at https://www.thousandeyes.com/resources/monitoring-ipv6-networks-webinar
Monitoring and Troubleshooting for Online OperationsThousandEyes
Your organization requires a proactive approach to network monitoring to achieve your application up-time goals. ThousandEyes brings visibility to the networks that handle your application traffic. In these slides, we share how to:
See your application's network path from customers to data centers.
Pinpoint exactly where network issues occur.
Correlate metrics including response time, page load time, packet loss and routing changes.
Watch the recorded webinar with live demo here: http://ow.ly/BzCo4
ThousandEyes Alerting Essentials for Your NetworkThousandEyes
ThousandEyes provides network monitoring and alerting capabilities. Alerts are triggered based on conditions defined in alert rules, which specify tests, thresholds, and notification policies. Alerts can be configured for various network and application scenarios based on factors like loss, latency, routing changes, DNS issues, page load times, and more. Notifications can be sent by email, PagerDuty integration, or custom webhooks. The system aims to reduce false positives through configurable filtering and requiring multiple failed tests. Historical alert data is also available.
FS-ISAC 2014 Troubleshooting Network Threats: DDoS Attacks, DNS Poisoning and...ThousandEyes
The network is a key component in application delivery and is often a direct or indirect target of security attacks
such as DDoS and BGP hijacking. Mitigation strategies often involve using a third party cloud service without any
visibility into whether the mitigation is working well. Using real life examples, we will show how one can measure
the user perceived impact of an ongoing attack, as well as identify which aspects of the mitigation are not working
as desired. With this detailed availability and performance data at the various layers, financial firms can learn how
to better manage ongoing attacks.
Cisco uses ThousandEyes to monitor cloud services and gain visibility into network stability and troubleshooting. ThousandEyes helps Cisco reduce the mean time to troubleshoot issues by 43% and the mean time to restore services by 8%. ThousandEyes has successfully helped Cisco resolve issues with WebEx, Salesforce, firewalls in India, and support apps in India. Cisco's goal is to run ThousandEyes on Cisco routers to improve monitoring.
ThousandEyes provides network intelligence and monitoring of web performance. It offers different test types - HTTP server tests measure server response times, page load tests measure loading of full web pages in a browser, and web transaction tests measure performance of specific user interactions on a site. The tests provide metrics on response times, throughput, errors and performance of individual page components from different network locations and internet providers. The document recommends tips for optimizing web transactions such as adjusting timeouts, configuring start/stop steps, using XPath locators, and inserting wait conditions. It demonstrates creating and running page load, HTTP server and web transaction tests to monitor web performance.
How Intuit Monitors Connectivity to AWS ThousandEyes
Presentation by Daniel Shanahan, Staff Network Performance Engineer @ Intuit on how they rely on ThousandEyes to monitor connectivity and infrastructure performance to AWS
Discover Network Insights with ReportsThousandEyes
Reporting network performance data can sometimes feel like a chore. So we've created fully customizable reports to save you the time and sweat. We cover new reporting capabilities and highlight tips on how to best showcase your data and derive insights for your team.
In this slide deck, we share how to customize reporting graphs and metrics, select impactful views for your network data and schedule, save and share snapshots of your reports.
Enterprise and Wide Area Network VisibilityThousandEyes
Finding network faults can be time consuming and costly. And the increasing use of wide area networks, driven by mobile devices, telecommuting and SaaS applications, adds complexity. ThousandEyes helps you quickly solve network issues by giving you end-to-end visibility of the network, however geographically distributed your organization is.
In this presentation, we share how to:
Monitor today's complex network topologies.
Visualize the health of enterprise and wide area network environments.
Measure performance between branches, data centers and Internet services.
In part 4 of this BGP webinar series, we cover how to optimize Autonomous System paths, especially in cases of suboptimal international routes. Tips include monitoring layer 3 forwarding alongside BGP, monitoring reverse paths, layering covering prefixes, as well as prepending and MED.
Starting from key concepts, you'll learn how to recognize route leaks and hijacks in the data, alert for these events and proactively mitigate their impact. See the webinar recording at https://www.thousandeyes.com/webinars/detecting-hijacks-and-leaks
Monitoring Apps & Networks in a Cloud-Centric World at Gartner IOSS 2016ThousandEyes
Cloud and mobile technologies are changing your network, from where services are hosted to where they are consumed. These trends have profound implications for application delivery, network architectures and diagnostic techniques. We’ll discuss three case studies from organizations that are undergoing, and managing, the transition to a cloud-centric network.
This document outlines the six steps of the Big 6 research model: 1) task definition to discover the problem and information needed, 2) information seeking strategies to find reliable sources to answer the question, 3) location and access of sources and how to access information efficiently, 4) use of information by interacting with and extracting relevant information, 5) synthesis to structure, summarize, and integrate information from various sources, and 6) evaluation to use information efficiently, reference sources, and evaluate the research process and results.
Applications increasingly rely not only on internal enterprise networks, but also on the Internet, for high levels of end user performance. The ThousandEyes platform helps you to deploy monitoring points, analyze network data and collaborate with external vendors to achieve superior application delivery for your employees and customers. In this presentation, we demo how to collect performance data across enterprise, WAN and ISP networks, and analyze metrics and network topologies to find root causes. Watch the full presentation with interactive demo here: https://www.thousandeyes.com/lp/getting-started-webinar
Measuring and Troubleshooting Performance of Global Data Centers at ServiceNowThousandEyes
Geoff Wade, Senior Network Engineer, presents how ServiceNow relies on ThousandEyes Cloud Agents to provide insights into datacenter availability and reachability along with diagnostic data for ISP outages.
ISP Connectivity Webinar: No Longer a Black BoxThousandEyes
Your Internet Service Providers are critical to keeping your data centers and offices connected. Yet you may not have much insight into the performance of ISP links outside your network. ThousandEyes maps network topologies across ISP networks, measures performance of data center ingress and egress, and captures BGP routing changes across all relevant prefixes.
In this webinar, we’ll share how to:
*Get visibility into ISP environments in just minutes
*Associate path and route changes to app and network performance
*Share data on specific problem interfaces and links with your ISPs
Enterprise Agents: Deployment Best PracticesThousandEyes
This document provides best practices for deploying ThousandEyes Enterprise Agents within an organization's network. It discusses the different deployment models for the agents including virtual appliances, containers, and physical installers. It recommends deploying agents in data centers, branch offices, and remote locations to monitor WAN links, SaaS applications, and voice/web services. Guidelines are provided around choosing appropriate tests based on agent resources and setting up agents behind NAT or proxies. A demo is also offered to illustrate installing and running tests with the Enterprise Agents.
Learn how to monitor the performance of IPv6 networks, including DNS resolution, IP paths, loss and latency, and BGP routing. View the webinar at https://www.thousandeyes.com/resources/monitoring-ipv6-networks-webinar
Monitoring and Troubleshooting for Online OperationsThousandEyes
Your organization requires a proactive approach to network monitoring to achieve your application up-time goals. ThousandEyes brings visibility to the networks that handle your application traffic. In these slides, we share how to:
See your application's network path from customers to data centers.
Pinpoint exactly where network issues occur.
Correlate metrics including response time, page load time, packet loss and routing changes.
Watch the recorded webinar with live demo here: http://ow.ly/BzCo4
ThousandEyes Alerting Essentials for Your NetworkThousandEyes
ThousandEyes provides network monitoring and alerting capabilities. Alerts are triggered based on conditions defined in alert rules, which specify tests, thresholds, and notification policies. Alerts can be configured for various network and application scenarios based on factors like loss, latency, routing changes, DNS issues, page load times, and more. Notifications can be sent by email, PagerDuty integration, or custom webhooks. The system aims to reduce false positives through configurable filtering and requiring multiple failed tests. Historical alert data is also available.
FS-ISAC 2014 Troubleshooting Network Threats: DDoS Attacks, DNS Poisoning and...ThousandEyes
The network is a key component in application delivery and is often a direct or indirect target of security attacks
such as DDoS and BGP hijacking. Mitigation strategies often involve using a third party cloud service without any
visibility into whether the mitigation is working well. Using real life examples, we will show how one can measure
the user perceived impact of an ongoing attack, as well as identify which aspects of the mitigation are not working
as desired. With this detailed availability and performance data at the various layers, financial firms can learn how
to better manage ongoing attacks.
Cisco uses ThousandEyes to monitor cloud services and gain visibility into network stability and troubleshooting. ThousandEyes helps Cisco reduce the mean time to troubleshoot issues by 43% and the mean time to restore services by 8%. ThousandEyes has successfully helped Cisco resolve issues with WebEx, Salesforce, firewalls in India, and support apps in India. Cisco's goal is to run ThousandEyes on Cisco routers to improve monitoring.
ThousandEyes provides network intelligence and monitoring of web performance. It offers different test types - HTTP server tests measure server response times, page load tests measure loading of full web pages in a browser, and web transaction tests measure performance of specific user interactions on a site. The tests provide metrics on response times, throughput, errors and performance of individual page components from different network locations and internet providers. The document recommends tips for optimizing web transactions such as adjusting timeouts, configuring start/stop steps, using XPath locators, and inserting wait conditions. It demonstrates creating and running page load, HTTP server and web transaction tests to monitor web performance.
How Intuit Monitors Connectivity to AWS ThousandEyes
Presentation by Daniel Shanahan, Staff Network Performance Engineer @ Intuit on how they rely on ThousandEyes to monitor connectivity and infrastructure performance to AWS
Discover Network Insights with ReportsThousandEyes
Reporting network performance data can sometimes feel like a chore. So we've created fully customizable reports to save you the time and sweat. We cover new reporting capabilities and highlight tips on how to best showcase your data and derive insights for your team.
In this slide deck, we share how to customize reporting graphs and metrics, select impactful views for your network data and schedule, save and share snapshots of your reports.
Enterprise and Wide Area Network VisibilityThousandEyes
Finding network faults can be time consuming and costly. And the increasing use of wide area networks, driven by mobile devices, telecommuting and SaaS applications, adds complexity. ThousandEyes helps you quickly solve network issues by giving you end-to-end visibility of the network, however geographically distributed your organization is.
In this presentation, we share how to:
Monitor today's complex network topologies.
Visualize the health of enterprise and wide area network environments.
Measure performance between branches, data centers and Internet services.
In part 4 of this BGP webinar series, we cover how to optimize Autonomous System paths, especially in cases of suboptimal international routes. Tips include monitoring layer 3 forwarding alongside BGP, monitoring reverse paths, layering covering prefixes, as well as prepending and MED.
Starting from key concepts, you'll learn how to recognize route leaks and hijacks in the data, alert for these events and proactively mitigate their impact. See the webinar recording at https://www.thousandeyes.com/webinars/detecting-hijacks-and-leaks
Monitoring Apps & Networks in a Cloud-Centric World at Gartner IOSS 2016ThousandEyes
Cloud and mobile technologies are changing your network, from where services are hosted to where they are consumed. These trends have profound implications for application delivery, network architectures and diagnostic techniques. We’ll discuss three case studies from organizations that are undergoing, and managing, the transition to a cloud-centric network.
This document outlines the six steps of the Big 6 research model: 1) task definition to discover the problem and information needed, 2) information seeking strategies to find reliable sources to answer the question, 3) location and access of sources and how to access information efficiently, 4) use of information by interacting with and extracting relevant information, 5) synthesis to structure, summarize, and integrate information from various sources, and 6) evaluation to use information efficiently, reference sources, and evaluate the research process and results.
This document describes the author's various identities. She identifies as a daughter, sister, family member, rower who is part of the Otago University and Avon rowing clubs, a traveler who has been to China and Seattle through rowing, a physical education student studying to become an occupational therapist. She also identifies as an independent adult through living in various flats while studying. Her future goals are to become a multisport athlete by competing in long distance races, learning to kayak, and maintaining her identity as a runner.
This document lists several rivalries across different industries throughout history:
- Coke and Pepsi have battled for over a century to be the top cola brand, with Coke regaining the lead in the 21st century.
- Apple and Microsoft have competed neck and neck as the leading computer and tablet companies, while Dell and HP also strive to be the best.
- Google and Bing are two of the world's most prominent search engine rivals, with studies showing Google provides more and better information.
- In ancient Greece, Athens and Sparta were the two top cities, each believing they had the best warriors, athletes, and cuisine.
- Nintendo and Sony have been video game rivals since their inception, creating iconic
Case study on how virtual workforce and virtual assistants can help with Executive Branding or Personal Branding implementation. John Davern, President & CEO of Virtual Assistant Talent, LLC shares how virtual assistants (VAs) can help you implement your executive/personal brand by designing your logo, website, creating your tag line, updating your social media accounts to be consistent with your brand, create your executive bio/profile from your resume, assist you in authority marketing by creating press releases/blogs/articles/blog commenting for you, and building your social networks and influence by managing your social media accounts, participating and connecting with professionals in LinkedIn and creating groups, etc. Learn how this Next Practice can help you, as presented by John Davern at the Executive Next Practices Institute event on April 4, 2014 in Irvine, CA.
SC Galatasaray: To work with fans and generate profit in social media (Ertug ...ResultSportsUkraine
Galatasaray, a Turkish soccer club, has successfully used social media to engage with fans and generate revenue. They opened accounts on platforms like Facebook and Twitter, collecting data on over 10 million followers. An official announcement launched their social media strategy. They then partnered with brands like Nike and Nikon, using targeted campaigns to reach over 14 million fans within 5 minutes. This direct engagement with supporters through social media has led to new partnerships and increased revenue for Galatasaray.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
Dokumen ini memberikan instruksi dasar tentang cara menggunakan Microsoft PowerPoint 2007, termasuk cara membuat file baru, mengedit teks dan format teks, menyimpan file, dan menutup file.
This document provides an overview and summary of the Benchmarking Public Procurement 2017 report, which assesses public procurement regulatory systems in 180 economies. Some key points:
- The report examines laws and regulations affecting private suppliers' participation in public procurement markets globally. It covers more economies than previous editions to enhance understanding.
- Data is presented on the procurement process from needs assessment to contract implementation, and on complaint review mechanisms. This provides insight into challenges countries face in establishing transparent procurement markets.
- By informing policy discussions, the report aims to strengthen the role of procurement in promoting economic growth and private sector development. Comparable global data on procurement markets has been limited, so this report seeks to address that gap.
Religion, the core of the interfaith discourse, is the new ‘empire of the mind’. It has acquired the minds of our citizens; possesses the power of state; expressed in terms of money and wealth; guarantees influence; and controls resources. Religion is war; it is modern conflict, and the most dangerous threat to societal peaceful existence.
Roadhouse Seats was founded in 2012 by master craftsman, Bryan W. Nappi, of Las Vegas, Nevada. Bryan, an avid motorcyclist, discovered that if he and his wife wanted to continue to ride, something had to be done about the uncomfortable seats. Not only was his own back and tailbone aching after a day on his bike, but his wife's was too!
Managing Network Performance Within and Beyond Your EnterpriseThousandEyes
Your organization relies on the public Internet to deliver both on-premises and SaaS applications across a geographically distributed employee base. In these slides, see traditional enterprise networks vs. the complex topologies you rely on today, three problems with using traditional network performance management tools and the foundational technologies ThousandEyes has built to address the performance challenges of the modern enterprise. View the webinar with live demo here: http://ow.ly/BzAkM
Este documento presenta un proyecto para implementar una empresa dedicada a la organización de eventos infantiles en la ciudad de Tarma. La empresa ofrecería todos los servicios necesarios para una fiesta infantil como local, decoración, música, animación, equipo de sonido y luces. El proyecto está dirigido a padres que tienen poco tiempo para organizar las fiestas de sus hijos. Se realizó un análisis de mercado, técnico y financiero que determinó que el proyecto es viable y generará rentabilidad.
Discover the Power of ThousandEyes on Your Meraki MXThousandEyes
ThousandEyes provides network and application monitoring capabilities that can be deployed on Meraki MX devices. The ThousandEyes Enterprise Agent runs on Meraki MX routers and generates synthetic test traffic to monitor business critical SaaS applications and services. It analyzes thousands of data points to provide detailed path visualization and correlated insights. Deploying ThousandEyes on Meraki MX allows monitoring of applications accessible over direct internet access or through Meraki AutoVPN, complementing metrics from Meraki Insights with more comprehensive monitoring, troubleshooting and visibility capabilities.
The document discusses planning and designing a small network, including:
- Identifying common devices used such as routers, switches, wireless access points, and IP phones.
- Design considerations for a small network like IP addressing, redundancy, traffic prioritization.
- Common network applications and protocols used, including VoIP, DHCP, DNS.
- Ensuring the network can support real-time applications like voice and video.
- Planning for future growth of the network through documentation, traffic analysis, and protocol analysis.
Aruba introduced its virtualized controller solution called Aruba Instant, which provides a centralized management platform for wireless networks through a virtualized controller with integrated redundancy and distributed control and data planes. Aruba also unveiled its cloud-based network management platform Aruba Central, which provides zero-touch provisioning, monitoring, configuration, troubleshooting, reporting and guest WiFi services for networks through a software-as-a-service model. Additionally, Aruba Central includes an MSP dashboard for managed service providers to centrally manage multiple customer accounts and networks.
New Splunk Management Solutions Update: Splunk MINT and Splunk App for Stream Splunk
Learn what is new in Splunk App for Stream and how it can help you utilize wire/network data analytics to proactively resolve applications and IT operational issues and to efficiently analyze security threats in real-time, across your cloud and on-premises infrastructures. Additionally, you will learn about Splunk MINT, which allows you to gain operational intelligence on the availability, performance, and usage of your mobile apps. You’ll learn how to instrument your mobile apps for operational insight, and how you can build the dashboards, alerts, and searches you need to gain real-time insight on your mobile apps.
We'll hear from a few local industry experts on the war stories, design considerations and best practices of NAC (Network Admission Control / 802.1x ) deployments. Each lightning talk will feature different point of views and vendors. After the talks, we'll host a Q/A panel with questions from our audience. Please come with some questions! Feel free to enter them in the RSVP or post on the meetup page.
Talks and Q/A panel will be done by: Kyeyeon Kim, Andy Richter, Josh Trivilino
The document discusses NetScout's products for unified performance monitoring including packet flow switches, packet capture appliances, and the nGeniusONE management platform. nGeniusONE provides service-oriented monitoring across physical, virtual and cloud environments and analytics to troubleshoot application and network performance issues. It can monitor voice, video and other unified communications workloads in real-time with metrics to analyze user experience.
Network analytics provides insight into what devices are on a network and how they communicate, helping networking teams manage increasing applications and locations. This information can help troubleshoot performance issues and also be monetized by network operators. Traditional troubleshooting is challenging due to lack of flexibility, visibility, and tools to identify specific problems. Network analysis appliances can capture all network traffic without affecting performance and provide troubleshooting, security investigation, and monitoring of voice and wireless networks.
Network Analysis Tips and Tricks with OmniPeekSavvius, Inc
An un-patched system that was compromised. Users trying to connect to a box that’s not there. Traps being sent out on an issue that’s ignored by the monitoring system. Do any of these issues sound familiar? These are the types of issues our professional service engineers find and address on a daily basis.
With a corporate history spanning 23 years, and hundreds of person-years of customer-facing network analysis and troubleshooting experience, it’s clear that we’ve come across more than a few problems along the way. It’s time for us to share. In this web seminar our team of customer-facing engineers will highlight some of their favorite problems, including how they uncovered the problem, what they recommended to solve it, and how they verified that the proposed solution was successful. Please join us for this highly informative, real-world demonstration of what really goes wrong in enterprise networks. And be sure to bring your questions!
In this web seminar, we will cover:
Common and not so common problems seen on today's networks
Tips for identifying common problems
Tricks for addressing common problems
What you will learn:
How common problems get missed by standard monitoring systems
Why deep packet inspection succeeds when other solutions fail
How to find, fix, and verify common, and not so common, network problems
How ManageEngine NetFlow Analyzer helped Boston Properties Save Bandwidth CostsNetFlow Analyzer
This presentation is about how ManageEngine NetFlow Analyzer played an effective role in managing network bandwidth at one of America's leading real estate companies Boston Properties.
The document provides an overview and agenda for a technical deep dive into Cisco SD-WAN. It discusses extending Cisco SD-WAN to Cisco routers, using Cloud onRamp to improve access to SaaS and IaaS applications, and providing layered security between sites and to the cloud. It also covers operations and troubleshooting capabilities in Cisco SD-WAN such as infrastructure monitoring, application visibility, performance statistics, and troubleshooting tools.
Amir Alam Mohammad is seeking assignments in network administration with over 3 years of experience in network administration. He has experience monitoring over 200 corporate systems, installing switches and access points, troubleshooting IP and connectivity issues, and configuring firewalls and VPNs. He is proficient in networking protocols, routing, switching, and server administration and has certifications in CCNA.
The right Wireless Architecture for youCisco Canada
This document discusses different wireless network architectures from Cisco, including autonomous access points, centralized architecture, and FlexConnect architecture. Autonomous access points are managed individually while centralized architecture uses wireless LAN controllers for centralized management. FlexConnect is an extension of centralized that allows some local switching and control at remote branch sites for better WAN efficiency and high availability when the connection to the main controller fails. The document provides details on how each architecture works, available access point and controller options, benefits and limitations of each.
NetMotion Wireless provides a software-only mobile VPN solution called NetMotion Mobility that addresses challenges of productivity, security, and management for mobile field workers. It eliminates issues caused by disconnected networks, ensures security across any network, and provides application-level visibility and control. Customers like Cox Communications, Birmingham City Council, US Foods, and Allina Home Care & EMR saw increases in productivity, reductions in support calls, ability to keep application sessions alive during disconnects, and centralized management of remote devices and policies.
Federal Tools Webinar: Leveraging Affordable Tools to Enhance Your Orion Impl...SolarWinds
SolarWinds Network Topology Mapper and Engineer’s Toolset seamlessly integrate with Orion modules to provide mapping and context-sensitive troubleshooting support to Network Performance Monitor, Network Configuration Manager, NetFlow Traffic Analyzer, and other Orion modules. These low-cost tools boost the productivity of your IT staff by improving network visualization and allowing faster completion of troubleshooting tasks.
The webinar demonstrated how to:
• Use Network Topology Mapper to discover the IT assets on your network including Layer 2 and Layer 3 topology data
• Use Network Topology Mapper to produce powerful network visualization data for export to both Visio diagrams and to the Orion Network Atlas utility that displays in the Orion web console of Network Performance Monitor
• Use the Engineer’s Toolset to deliver context-sensitive right-click access to 50 powerful troubleshooting tools directly from within the Orion web console of Network Performance Monitor and Network Configuration Manager to empower your IT Pros to quickly resolve issues
Exinda is a proven global supplier of Traffic Shaping & WAN Optimization products. Exinda provides users with the best application experience possible by maximizing the speed and efficiency of the wide area network.
The document discusses the new enterprise reality of hybrid workers, modern app architectures, software as a service (SaaS) adoption, and agile networks. It notes that enterprise IT is rapidly losing visibility and control as infrastructure is provisioned at the edge and outages can be caused by external providers. ThousandEyes provides cloud and network intelligence to give enterprises deep visibility into every layer of the network and applications to help optimize digital experiences. This includes monitoring application performance, network paths, routing, and correlating data to identify issues. ThousandEyes has agents around the world and integrates with popular platforms.
SolarWinds Federal User Group 2016 - SolarWinds Network Management Products U...SolarWinds
In this 2016 online Federal User Group presentation Jeff Stewart, Product Strategist, SolarWinds, shares the latest network management products updates, including
NPM 11.5, and NCM 7.4. We also share what we're working on, as well as what we're thinking about for future development efforts for these products.
Visualizing Application & Delivery Flows to Make Data-Driven DecisionsCA Technologies
Even the most intelligent network needs management to visualize application traffic flows at the network level and know how well application service levels are being met. The CA Application Performance Management solution leverages key performance indicators from Cisco’s Intelligent WAN solutions, which add value to your network through application visibility and control, application acceleration (WAN optimization) and intelligent path selection. By enabling you to gain visibility into application performance from a network perspective, you can make proactive, data-driven decisions regarding network capacity, QoS policies, infrastructure investments and planned application rollouts.
For more information on DevOps solutions from CA Technologies, please visit: http://bit.ly/1wbjjqX
Similar to Endpoint Agent Part 1: End User Experience (20)
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
This document discusses how to effectively monitor SD-WAN and SASE environments with ThousandEyes. It begins with an agenda that includes why SD-WAN is important, the challenges of monitoring complex networks, testing scenarios for applications and underlays, a demo, and Q&A. SD-WAN offers benefits like high availability, performance for critical apps, traffic management, simplified cloud connectivity, and supporting hybrid infrastructures. However, visibility is challenging with many variables that could impact performance across branches, clouds, security functions, and more. ThousandEyes provides testing from global vantage points to identify issues throughout these environments.
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
This document outlines a presentation on using ThousandEyes to help retailers address challenges in digital experiences. It features three speakers and discusses how ThousandEyes can provide visibility and monitoring across retailers' apps, infrastructure, and employees. It also highlights key retail initiatives like optimizing ecommerce, back-office operations, and retail operations performance. ThousandEyes offers use cases to help improve uptime and assure the customer experience. The presentation concludes with next steps like free trials and demos of the ThousandEyes platform.
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
This document discusses how to effectively monitor SD-WAN and SASE environments with ThousandEyes. It begins with an introduction of the speakers and an agenda that includes why SD-WAN is important, the challenges of monitoring these environments, testing scenarios for applications and underlays, a demo, and Q&A. SD-WAN is growing due to factors like site-to-cloud connections and cost optimization. The challenge is determining where issues occur across complex environments spanning networks, SASE services, applications and more. ThousandEyes provides visibility through testing from its global vantage points and agent-based infrastructure.
New ThousandEyes Product Features and Release Highlights: March 2024ThousandEyes
ThousandEyes has released several new features and enhancements in February 2024, including a new API monitoring test type, platform innovations like dashboard filters, and improvements to endpoint monitoring. The presentation provides demonstrations of the new API test type, AWS API Gateway recommendations, Cisco Secure Access experience insights integration, enhanced endpoint test creation workflow, and event detection capabilities.
The document provides an overview of a presentation about ThousandEyes Digital Experience Assurance. It introduces the speakers and outlines the agenda which includes introducing ThousandEyes, discussing modern assurance challenges, a demo, and Q&A. It discusses how digital experiences impact business and outlines the challenge of managing experiences across distributed infrastructure with shrinking visibility. ThousandEyes is presented as a solution to assure digital experiences over any network with end-to-end visibility, intelligence, and automated workflows.
Outage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedInThousandEyes
The document provides a summary of three outages that occurred on March 5th and 6th, 2024:
1. A Meta outage from 15:00-19:27 UTC on March 5th that affected Facebook, Instagram, Messenger and other services due to backend authentication system failures.
2. A Comcast outage from 19:45-21:40 UTC on March 5th that caused increased latency and connectivity issues within Comcast's Texas backbone network, impacting applications like Webex, Salesforce and AWS.
3. A LinkedIn outage from 20:45-21:50 UTC on March 6th where the application was inaccessible due to backend service errors, though network connectivity was unaffected
Assure Patient and Clinician Digital Experiences with ThousandEyes for Health...ThousandEyes
This document discusses how ThousandEyes can help healthcare organizations assure patient and clinician digital experiences. It provides an overview of the current healthcare landscape including challenges around digital transformation, hybrid workforces, and growing complexity. The document then outlines how ThousandEyes offers digital experience monitoring and internet visibility capabilities to help healthcare organizations improve patient experiences, ensure network assurance, enhance employee productivity, and reduce clinician frustration. Use cases are presented for optimizing applications, infrastructure, and supporting remote workforces.
AMER Introduction to ThousandEyes WebinarThousandEyes
This document provides an overview of a ThousandEyes presentation. It includes:
- Introductions of the featured speakers from ThousandEyes
- Information about asking questions during the presentation
- The agenda which covers a ThousandEyes introduction, demo, and Q&A
- Details on ThousandEyes locations, customers, and founding
- Use cases for how their monitoring solutions support digital experiences
- A demo section showing how their tools monitor remote workforces and the internet
New ThousandEyes Product Features and Release Highlights: February 2024ThousandEyes
The document summarizes new features and enhancements for the ThousandEyes product in February 2024. It includes a new API monitoring test type, platform innovations like dashboard filters, and enhancements to ThousandEyes endpoint monitoring and its integration with Cisco Secure Access and Webex. It also previews upcoming capacity planning features for WAN Insights. Feature demos are provided to showcase the new API test type, dashboard filters, and endpoint test creation workflow.
The Top Outages of 2023: Analyses and TakeawaysThousandEyes
The document summarizes internet outages that occurred in 2023. It provides statistics on different types of outages including an increase in cloud service provider outages and application outages. Specific outages that impacted Microsoft, Virgin Media, AWS, Slack, Square, and Workday are described in 1-2 sentences each. Key takeaways are to understand how applications and networks are interconnected, track different outage categories over time, and that improved visibility can help prevent and minimize outage impact.
Enhancing SaaS Performance: A Hands-on Workshop for PartnersThousandEyes
The document outlines an enterprise digital experience workshop hosted by Cisco. The agenda includes an overview of ThousandEyes, which provides end-to-end network visibility through a global network of agents. It covers how traditional tools cannot monitor external dependencies and domains not owned by the enterprise. The agenda also includes a guided demo of the ThousandEyes platform and its many use cases for issues like hybrid work, SaaS apps, and secure access.
The Top Outages of 2023: Analysis and TakeawaysThousandEyes
The document discusses internet outages in 2023 based on analysis from ThousandEyes. It finds that cloud service provider outages increased compared to internet service provider outages. Outages tended to be more localized within the US rather than global. Application outages also rose over the year. Case studies of specific outages that impacted Microsoft, Virgin Media, AWS, Slack, Square, and Workday/Cloudflare are presented. The takeaways are that understanding how applications work is important to identify failures, and improved visibility across networks and applications can help prevent and minimize outage impacts.
The Top Outages of 2023: Analysis and TakeawaysThousandEyes
The document discusses internet outages in 2023 according to analysis by ThousandEyes. It finds that cloud service provider outages increased compared to internet service provider outages. It also notes that outages tended to be more localized within the US rather than global. The document reviews several outages that occurred in 2023, including issues with Microsoft, Virgin Media, AWS, Slack, Square, and an outage involving both Workday and Cloudflare due to infrastructure failures. It emphasizes the importance of understanding how applications and networks interact to identify failures and make improvements to prevent outages.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
1. Endpoint Agent Part 1:
End User Experience
Nick Kephart, Sr. Director of Product Marketing
2. • August 18th 2016
• An overview of Endpoint Agent with key use
cases, how it works and a view of the data
collected
Endpoint Agent Webinar Series
• October 11th 2016
• Understand performance of local access networks,
whether wired or wireless
End User Experience
LAN, Wireless,
Gateways & Proxies
• September 15th 2016
• Get visibility into SaaS performance from your
employees globally
Monitoring SaaS Apps
from Anywhere
Troubleshooting
Remote Workers
• October 27th 2016
• Solve issues for employees at home, on the road and
connecting through VPNs
3. 2
About ThousandEyes
ThousandEyes delivers visibility into every network your organization relies on.
Founded by network
experts; strong
investor backing
Relied on for
critical operations by
leading enterprises
Recognized as
an innovative
new approach
31 Fortune 500
5 top 5 SaaS Companies
4 top 6 US Banks
4. 3
Monitor App & Network Connectivity Anywhere
Hosting / SaaS
Provider
3 Application Delivery
Website, CDN,
DNS,
ISP, BGP, DDoS
Internet
1 Enterprise WAN & LAN
Internal Apps, VoIP, Wi-
Fi and Access Networks
2 Cloud Migration
SaaS, IaaS, VPNs
and Remote Workers
Access
Networks
Cloud Agents
Enterprise
Agents
Branch
Data
Center
Endpoint Agents
Endpoint
Agents
5. 4
Enter ThousandEyes Endpoint Agent
• Previously unattainable visibility into
the “last mile” (where so much can go
wrong)
• Constant, trustworthy performance
data & network context no matter
where your users do work
• Instantly filter & drill into data to
troubleshoot any machines, sites, or
geographies
• Identify & understand trends by
reporting across aggregate data
6. 5
Baseline & troubleshoot performance for mission-critical:
• 3rd-party SaaS applications
• And also internal applications
Three Endpoint Agent Use Cases
• Local & end-to-end network troubleshooting
• Wireless usage & saturation monitoring
SaaS
Monitoring
WAN & LAN
Monitoring
Troubleshoot web app, connectivity and device issues
for:
• Home offices
• Traveling employees
Remote Worker
Troubleshooting
7. 6
SaaS
monitoring
SaaS Monitoring
• Visualize connectivity
across users,
locations and
services.
• See performance by
office, network or for
remote workers.
• Quickly filter user
session information for
trend analysis or
individual
troubleshooting.
8. 7
• Baseline application and
network performance
across users anywhere
• Remotely troubleshoot
issues with VPN, SaaS or
internal app connectivity.
• Quickly localize loss and
latency to a specific portion
of your network
or that of a
service provider.
Remote Worker Troubleshooting
9. 8
WAN & LAN Monitoring
• Locate network
coverage,
congestion or device
faults that affect
specific locations,
networks, proxies,
gateways and
access points.
• Measure wireless
(SSIDs & BSSIDs)
and wired
performance across
the campus or
anywhere in your
global WAN.
10. 9
• Monitored Networks
– Prefixes or network
blocks that are assigned
a Monitoring Profile with
Monitored Domains
– Periodic network statistics
option will gather local
access network data
every 5 minutes
• Monitored Domains
– Web domains that trigger
a User Session each time
the user browses to a
new domain, subdomain
or tab
Getting Started with Endpoint Agent
• When a user is on a
Monitored Network
– Network Topology data
(wired, wireless, gateway,
VPN, proxy) is collected
every 5 minutes
• When a user is on a
Monitored Network
and browses to a
Monitored Domain
– Performance data
collected from the
browser, network config
from the OS, and active
measurements from the
OS (path visualization,
loss, latency)
Configuration Data Collection
• Install Endpoint Agent
– For Mac OS X and
Windows
• Make sure to also
install the browser
extension
– Link available in the
browser upon agent
installation
• Use GPO to deploy
the agent and
browser extension
Installation
11. 10
Endpoint Agent: How it works
Lightweight client software
Windows 7+, Mac OS X 10.9+
Negligible resource consumption
Typically <1% CPU, <40MB mem, <50MB disk
Easy deployment via standard tools
msi & pkg installers w/ auto-registration
End-user & background components
Browser plugin (Chrome & IE) & system service
Always up-to-date
Updates automatically, runs in the background
User Sessions - Web
Completion, response time, page load waterfall
User Sessions - Network
Loss, latency, jitter, failures, path visualization
Visibility across multiple layers Agent details
Access Network Topology
Wired, wireless, VPN & proxy network topology
15. See what you’re missing.
Watch the webinar:
https://www.thousandeyes.com/resources/
endpoint-agents-end-user-experience-webinar
Editor's Notes
Extends visibility to the ‘new perimeter’, aka the endpoint
No matter where they are and where they are trying to get to…
Endpoint Agent provides previously impossible visibility all the way through to the ‘last mile’, where so much can go wrong
This is a place where no other monitoring solutions really have a play today, but it’s becoming increasingly important as services get outsourced and users become more mobile
What ThousandEyes has always done best is allow you to understand and troubleshoot the networks you don’t own; now we’re extending that to the endpoint
ANSWER: How might they deploy this (across entire organization or selectively into specific areas of their network)
No longer just active monitoring
Passively collected browser performance and timings
Triggers collection of data on device and network connection stats from the OS
Triggers active monitoring of gateway, VPN, proxy, path trace to target
Data streamed back to our Collector
Available centrally from all Endpoint Agents around the globe