Subscribe to our weekly newsletter
By subscribing you agree with the terms of our Privacy Policy
Subscribe
Some text here
Home > Cristina De Luca
Cristina de Luca is a journalist with a masters' degree in Marketing. The last 30 years of her career, Cristina dedicated to multi platform content within the IT and communication areas. De Luca was a reporter, editor and content director for News organisations such as the braziilain media Group Globo, IDG (IDC in Brazil), JB Media Group, O Dia and the internet news portal Terra. Cristina has been awarded six times the Comunique-se award in the categories IT and Specialists.
IT asset management (ITAM) is arguably more important to organizations than ever before. Along with IT monitoring and IT governance, it forms the priority tripod for CIOs in 2021. Some define it as a set of business practices that combine financial, inventory, and contractual functions to optimize spend and support lifecycle management and strategic decision-making in the IT environment. The ITAM process typically involves collecting an up-to-date and detailed inventory of an organization’s hardware, software, and network assets, and then using that information to make informed business decisions about IT-related purchases and redeployment. And increasingly, to help them assess threats, vulnerabilities, and incidents highlighted by monitoring.
With the advent of digital technology, companies have been asking customers to trust them in new and deeper ways. But that trust depends crucially on the available technologies being used with transparency, ethical practices, increased data privacy, and strengthened security. Not coincidentally, increasing investments in cybersecurity (74%), information security (64%), and consumer privacy (60%) are the top priorities for business leaders to demonstrate a commitment to building digital trust, according to a recent PwC survey of 311 executives from mid-to-large US companies. More than half of them (53%) strongly agree that innovation can be more effective than regulation in building stakeholder trust. That’s why nearly half (49%) have made significant changes in the last 12 months to the way their companies operate.
Unlike NetFlow, SNMP can be used for real-time network management as well as for monitoring and troubleshooting CPU and memory usage – features that are not currently provided by the NetFlow protocol. NetFlow does consume a lot more disk space than SNMP, but that is mainly because it is much more verbose than SNMP. SNMP has proven itself to be the most reliable network management protocol for routers, switches, and multi-protocol usage. However, because NetFlow provides more information, it is better for deep network analysis and debugging. NetFlow is best used for providing more detailed information about applications and traffic sources. Another advantage of NetFlow is that it uses push technology, which makes it capable of showing information as soon as it is available whereas SNMP uses pull technology to pull data from the device’s MIB (Management Information Base) at specific intervals. NetFlow can also provide information on speed, volume, and link usage.