Forget the bells and whistles of powerful networking tools. When overseeing clients' networks, some IT pros insist that simpler is better.
8 Steps To Building A Successful Cyber-Security Career
(Click image for larger view and slideshow.)
For Elijah Holiday, network administrator at Singhs Networking and Systems in Piscataway, N.J., simple tools are more valuable than powerful ones.
In a phone interview, Holiday described how for the past three months he's been using a set of networking tools released by Spiceworks on Wednesday. The small networking company he works for serves small business clients, often with five to ten employees, and tries to keep costs down.
Holiday said he started with the Subnet Calculator, a web-based tool that accepts a range of IP addresses and generates a list of subnets, a necessary step when dividing networks.
The tool, Holiday said, was "an easy way to get network information."
While Holiday has used more powerful networking tools like Wireshark and Microsoft Network Monitor, the simplicity of the Spiceworks tools fit his company's needs better. "Spiceworks works better for smaller business clients," he said. "...It's just lighter on resources."
Holiday also expressed appreciation for the low learning curve of the tools and for having all the tools in a single location, which isn't always the case for apps on specific machines. "Instead of setting up different tools at each client, there's one login where I can see everything," he explained.
Spiceworks, a social network, marketing channel, and service provider for IT professionals, also introduced several other tools: Blacklist Check and IP Reputation, IP Lookup, and Port Scanner and Tester. These web-based apps can help IT professionals analyze IP addresses, spot network vulnerabilities, and understand their networks.
Blacklist Check and IP Reputation rely on AlienVault's Open Threat Exchange to determine whether an IP address or hostname has been identified as malicious. This can be useful for spotting external threats or shining a light on internal practices that hinder email deliverability.
IP Lookup examines IP addresses and network hostnames to ferret out details about domains, the organization or owner behind the domain, and the place of origin. Such information can be useful for firewall configuration and limiting network access when IP addresses originate in countries deemed to pose a cyber-security risk.
Port Scanner and Tester will find open ports associated with a specific IP address, which can inform firewall configuration and help with network settings like port forwarding.
Holiday said he's been using these tools too, to understand more about where spam email is coming from and to make sure that when clients use telnet, the network ports used get closed. "They let us be a little more proactive," he said.
(Cover Image: pixelparticle/iStockphoto)
Thomas Claburn has been writing about business and technology since 1996, for publications such as New Architect, PC Computing, InformationWeek, Salon, Wired, and Ziff Davis Smart Business. Before that, he worked in film and television, having earned a not particularly useful ... View Full Bio
We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
Cybersecurity Strategies for the Digital EraAt its core, digital business relies on strong security practices. In addition, leveraging security intelligence and integrating security with operations and developer teams can help organizations push the boundaries of innovation.