Premium Content

Access "Network and application monitoring: A London school beefs up service"

Tracey Caldwell, Contributor Published: 13 Oct 2012

When Park High School in North London gained an extra 600 students and began the move into a virtualised environment, network manager David Crawley knew the school would need network and application monitoring tools to support growth. Over time, Park High's network has developed piecemeal, connecting a total of 1,700 students and 170 staff, with support for a mixture of laptops, desktops, thin clients, PCs, Macs and a partially virtualised server estate. “As with most schools, it’s very much something that has grown sporadically over the years, and we do tend to run computers a year or two longer than ideally you’d like to. So it can be quite a challenging network to manage,” said Crawley. In the past, attempts to monitor the network were “probably a little backwards,” he added. “If you had a device that was slowing down your entire network, to track that back you’d pretty much have to start at the centre of your network and work out step by step, he said. “[You would] log on to every switch individually, see if there was a particular port that was having ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free

  • Smart cards: security risks
    Smart-cards-security-risks-(1366208421_203).jpg
    E-Handbook

    Version 3 of the Java Card smart card specification, released in March 2008, overhauled the technical architecture of the smart card. The ...

  • Open Trusted Technology Provider Standard (O-TTPS)
    Open-Trusted-Technology-Provider-Standard-(O-TTPS)-(1365609248_609).jpg
    E-Handbook

    The O-TTPS is an open standard containing a set of guidelines that when properly adhered to have been shown to enhance the security of the global ...

  • The identity perimeter
    The-identity-perimeter-(1365173761_823).jpg
    E-Handbook

    Successful businesses recognise the value of open communications within and beyond their organisations. However, achieving this means that the ...