The answer depends on the strategy your organization uses to monitor and react to individual virtual server pool member outages. Some organizations, usually have smaller number of virtual server pool members in the pool, and choose to treat each member failure as critical and wish to react immediately. Pool member down alerts from HYCU SCOM…
F5 Big-IP was designed to ensure application availability by providing load balancing, security, acceleration and other services. In order to function in all circumstances F5 BIG-IP is typically deplo…

Large more complex organizations often have to support more complex network topologies while supporting large amounts of traffic and failover at the same time. F5 allows you to organize network interf…

As our customers notice, user behavior in business applications usually follows certain patterns, which can be observed in terms of connection rates, number of connections in time and data transfer. F…

Communication security and certificate use is one of the most important aspects of application delivery today. SSL/TLS certificates are principal elements in establishing information security, and whi…

Delivering the best possible user experience is not an easy task. Various components and aspects have to be taken into account to achieve high availability and superior performance. Application delive…

Minimizing or eliminating outages should be the goal for any monitoring solution. It’s definitely one of the main challenges we look to overcome. But it’s not just minimizing the outage but reduci…

The common standard to guarantee service uptime is 99.9% service uptime. That translates to less than 90 seconds of downtime per day, less than 45 minutes per month and less than 9 hours per year, on …

It was just ten years ago that applications were more of an afterthought, than core to a business. Now, with the rise of software and the emphasis on things like digital transformation, the cloud and …

In keeping with our mission to provide intelligent and proactive monitoring to help maximize up-time and security of applications delivered using F5 BIG-IP, we’re proud to announce the latest releas…

Having applications available to customers, secured and with expected performance, while keeping costs controlled is not an easy feat. It is a complex task and requires support and collaboration from …

As we all know, data or better yet, information extracted from data, is pure gold. However, it’s not just the information and extracted data that is extremely valuable. Applications, served by data,…

In our prior blog in this series on effectively managing application delivery, we discussed how to track application uptime and health. We’re now turning the focus on additional visibility IT manage…
IT services are now directly responsible for a significant portion of the revenue some companies makes. Don’t believe me? Take a look at Apple where their services business continues to grow and was…

If your monitoring solution is used only by your monitoring professionals then you’re missing what’s really important. There are a number of benefits that any monitoring solution must meet for mon…

A large part of the work we do at Comtrade Software in developing our SCOM Management Packs for F5 and Nutanix is we speak to a number of SysAdmins. Interesting to note that many of the SysAdmins we s…

A few day ago, I had a great conversation with an ASM specialist around how ASM can be included in DevOps. Every application developed and deployed needs to be secured and using ASM as an application …

Today, I’m proud to announce we have just released version 4.3 of our F5 BIG-IP management pack. This release contains several awesome new features, some of which are: Alert on multiple, consecutive…

F5 Agility 2017 just wrapped up and as a sponsor, we had many people coming by our booth and engaging in interesting conversations. A lot of questions were raised, so we have decided to share the thre…
Configuring F5 BIG-IP for the use of remote authentication is pretty straight forward and a common scenario. In order to give a remotely authenticated user access to the iControl REST API, user also n…

Specific F5 BIG-IP hardware platforms support the running of virtual BIG-IP instances, also called vCMP guests. Main monitoring efforts typically focus on these virtual instances (and rightly so!), as…

So, your network team is already monitoring your F5 BIG-IP devices using their special network tools. Case closed. Well, not really! It is still extremely valuable to have BIG-IP devices feed their av…

Of course you need monitoring and you already know that. By being astute and not taking unnecessary risks you already have some predispositioned monitoring to help you get through the day safely. The …

If you accept, process, store or transmit credit card information, chances are, you are compliant to the PCI standards and you don’t allow weak chippers (TLS v1, SSL v2 and SSL v3) on any of your sy…

When it comes to high-availability configurations F5 BIG-IP is simply great! Thanks to sync-failover device groups you can configure up to eight devices to synchronize data and support failover purpos…

We are happy to announce thelatest version of Comtrade SCOM Managment Pack for F5 BIG-IP. It has an improved high availability monitoring, SSL certificates monitoring, support for version 12.1.1, supp…

Just recently, I stumbled upon an interesting article by Shamus McGillicuddy titled: “Essential network monitoring system features for the enterprise” which caught my attention when I was research…

Earlier this month I visited F5 Agility US in Chicago, where Comtrade Software was one of the conference sponsors. Agility is a great event squarely focused on application delivery and it presents a u…

About a year ago, I started working on the F5 BIG-IP Application Delivery Controller (ADC) monitoring solution. When I began the project, I was looking for people using ADC to talk with them about the…

The impact of IT across business functions has never been more evident, and the role of IT department heads as critical contributors will continue to grow as technology drives more areas of a business…

Remember when you were a child and your parents defined a set of rules that you had to follow, or chores you had to complete? You didn’t always follow all the rules or complete every task, but you p…

Many businesses mistakenly assume that they aren’t sufficiently big or interesting to warrant a cyberattack. In reality, there isn’t a defined target for the global hacking community. They try to …
