Put our resources to work, for you.
Popular Search:
This document provides an introduction to SolarWinds services for US Defense. As agencies move toward "Zero Trust" security models and navigate the complexities of "Secure by Design" initiatives.

Modernize IT operations with a strategic roadmap. This guide breaks down the five pillars of ITSM maturity—Incidents, Assets, Experience, Services, and Changes—to move your team from firefighting to operational excellence.
Ayobami Ishola, Lead Network Ops at Qore Technologies, says SolarWinds fixed their lack of real-time visibility. Key wins: automated alerts, faster response, and easy deployment with Ha-Shem Limited. He highly recommends its scalability for all IT teams.
This Windows service executes scheduled jobs in SQL Server.
Network traffic management is the practice of controlling and optimizing how data moves through a network to ensure smooth performance, avoid network congestion, and maintain overall network health.
Learn more about workflow automation, automated workflow software, and the benefits to organizations after implementing such solutions.
What you need to know about incident response, how it works, and more.
A Distributed Denial of Service (DDoS) attack is a malicious attempt to disrupt the regular traffic of a server, service, or network.
Understand what knowledge management is and how it can benefit your organization.
Learn about SFTP vs. FTPS, their differences, common use cases, and more
collectd is a Unix daemon written in C language, and it’s designed to collect metrics pertaining to system resources and application performance.
Full stack observability involves monitoring and managing your entire technology stack’s performance, health, and security.
An observability pipeline, or a telemetry pipeline, is a system that helps gather, process, and send data from various sources to the right tools.
Serv-U FTP Server and Serv-U MFT Server can be integrated with third-party applications and shared databases. Check out more!
Discover cloud monitoring, its benefits, and the top solutions for keeping a close eye on your cloud infrastructure.
Learn what service level objectives are, how they work, and why they are vital for ensuring reliable, high-quality IT services.
Connect your change and incident management processes to reduce outages and lower risk. This guide provides a blueprint for safe deployments and rapid incident response using a unified ITSM platform.
SolarWinds® AI helps IT teams anticipate issues, automate responses, and improve resilience. Learn how unified AI tools reduce noise, prevent downtime, and support strategic work across observability, databases, and incident response.
Staffing constraints, cybersecurity threats, and tool proliferation are making IT increasingly difficult for schools and districts to manage and secure. Technology can help ease those challenges and streamline operations.
SolarWinds MSP partner 3GLA works with a leading LATAM bank to integrate a flexible solution that seamlessly integrates with their existing systems, apps, technologies, and future solutions.
Accessing and analyzing data efficiently is critical for healthcare organizations and health agencies to deliver optimal patient care, maintain security, and drive innovation. Download this whitepaper to learn more about the complexities of healthcare data modernization and the importance of Observability solutions.
Watch SolarWinds Day, where you’ll experience how SolarWinds is solving what others can’t – abstracting complexity, increasing visibility, and automating remediation across on-prem, hybrid, and cloud-native estates.
In an era when IT teams are continually tasked with doing more with less, observability tools provide a unified view into campus systems—as well as help identify and remediate incidents and ensure that operations run smoothly.
SolarWinds named a leader in the 2024 GigaOm Radar for Cloud Observability
This GigaOm survey, of 352 senior and technical decision makers across North America and Western Europe, assessed architectures, challenges, and approaches to building and managing performant applications.
We surveyed 374 IT and DevOps/AppDev professionals to gain insights into observability trends. Read this eBook to learn about:
Most impactful benefits of observability
Biggest challenges when deploying observability.
Biggest challenges when using observability in production.
SolarWinds® Observability delivers expanded monitoring and management of both on-premises and cloud environments, leveraging AIOps-powered capabilities to help accelerate issue remediation.
Do you know that 85% of organizations with observability practices use six or more tools to collect data from their application environment? TechTarget’s Enterprise Strategy Group recently surveyed IT and DevOps/AppDev professionals.
Compiled from a normalized sample of our customer base. This report encompasses over 2,000 ITSM systems, and over 60,000 aggregated and anonymized data points from July 1, 2023, to July 31, 2024. Users of IT Service Management tools will gain valuable, actionable insights from the report.
SolarWinds partnered with Market Connections to create a report and AI, observability, and cybersecurity. The initial survey targeted 100 public sector counterparts in the U.K.
SolarWinds partnered with Market Connections to survey 200 U.S. IT decision-makers and influencers from Federal, State & Local, and Education sectors.
Join product leaders from SolarWinds for an exclusive preview of the latest features in SolarWinds® Observability Self-Hosted and Orion® modules. Learn exactly how to use this solution to transform your operations.
Learn why companies struggle to align IT and business objectives despite abundant monitoring tools and observability platforms. Discover an approach that unifies and streamlines IT operations by integrating service management and observability.
Learn why businesses must align people, processes, and technology to thrive. This alignment not only improves day-to-day operations but also ensures the organization can withstand disruptions and adapt to future challenges. Deep dive into key strategies for achieving alignment.
See how customers feel about the benefits of using SolarWinds Service Desk from improvement in time to resolution to building a better end-user experience.
SolarWinds gives organizations the power to accelerate transformation, regardless of the size or complexity of their business.
Don’t take our word for it — See how businesses just like yours have used the power of SolarWinds to drive success.
Join our virtual event to discover new observability, database, and service management capabilities that enhance operational resilience. Explore Generative AI upgrades for smarter root cause analysis and automation. Plus, hear expert insights from Enterprise Strategy Group’s Torsten Volk.
Find out how OpenTelemetry is benefiting organizations worldwide. Prepared for SolarWinds by EMA this report is based on insights from 400 respondents across industries, and examines the perception, adoption, usage, and future of OpenTelemetry.
The 2025.2 release of SolarWinds Observability Self-Hosted features improved cloud monitoring, PoE monitoring, enhanced app component monitoring, recurring maintenance windows, wireless dashboard upgrades, increased poller scalability, and more.
In this 45-minute session, Technical Evangelist, Database at SolarWinds, Kevin Kline, teaches critical techniques to transform database efficiency. Learn how to write SQL SELECT statements for maximum efficiency.
The GigaOm Radar for Network Observability evaluates leading network observability solutions highlighting their key capabilities, strengths, and areas for improvement. The report helps organizations choose the right network observability tools.
Explore SolarWinds Observability Self-Hosted in an exclusive on-demand webcast. You will discover how easy it is to upgrade from your existing Orion modules, learn about the more flexible node-based licensing model, delve into AIOps features and security Observability, as well as get expert insights to elevate your IT strategy.
After a merger, a global law firm needed to consolidate multiple environments and IT solutions. See how SolarWinds partner Prosperon Networks helped the organization adopt SolarWinds Observability Self-Hosted.
Find out how OpenTelemetry is benefiting organizations worldwide. Prepared for SolarWinds by EMA this report is based on insights from 400 respondents across industries, and examines the perception, adoption, usage, and future of OpenTelemetry.
SolarWinds Joins the 2025 Gartner® Magic Quadrant™ for Observability Platforms. Find out why SolarWinds Observability was recognized in the report for our flexible self-managed and SaaS capabilities.
Learn how to build a high-impact portal with a searchable knowledge base, automated workflows, and AI-powered virtual agents.
In this free eBook you’ll discover how IT service providers use SLAs to prioritize IT service delivery.
Quickly find and fix SQL Server query performance issues with ease
Learn how to align IT services with business goals, overcome implementation challenges, and stay ahead of future trends like AI, DevOps integration, and cloud evolution.
A practical guide for DBAs and IT pros to optimize relational databases. Learn best practices in indexing, SQL tuning, execution plans, and observability in today’s hybrid IT environments.
Central Bedfordshire Council transformed IT from low trust to a 95%+ satisfaction rate with SolarWinds Service Desk. By combining modern ITSM with cultural change, they boosted visibility, automation, and service quality across departments.
AI-powered unified incident response solution for engineering and support teams to bring alerts into one place and manage incidents from consolidation to resolution.
Learn how to cut through alert fatigue with intelligent incident response. This master class shows how to reduce noise, map dependencies, and triage smarter—so your team can focus on what matters and resolve issues faster with Squadcast.
The SolarWinds 2025 IT Trends Report provides insights into operational resilience, surveying over 600 IT leaders from various roles, experience levels, and global regions. It highlights the challenges and strategies for staying agile in 2025.
Troubleshooting complex IT problems can consume your financial and physical resources. Read this whitepaper to learn how SolarWinds Observability Self-Hosted (formerly known as Hybrid Cloud Observability) delivers end-to-end visibility and leverages artificial intelligence for IT operations (AIOps) to accelerate root cause identification and remediation.
Introductory walkthrough of SolarWinds Network Topology Mapper (NTM), covering scan setup, device discovery via SNMP/WMI/VMware, and map customization. Ideal for showcasing core functionality to new users.
Manage your complex hybrid infrastructure and consolidate tools with confidence. This visual guide helps you quantify the value of full-stack observability, explaining how it can save you money while boosting operational control and customer satisfaction.
Big Brothers Big Sisters of America unified nationwide IT and cut resolution time by 40% with SolarWinds Service Desk. They replaced disparate tools to gain visibility, centralize support, and provide faster, proactive service for thousands of users.
Join us for Operational Resilience in 2025: Global and Regional IT Trends, a 30-minute webcast where we’ll reveal key findings from Fragile to Agile: The State of Operational Resilience—including exclusive regional insights.
Explore the 2025 State of ITSM report to uncover how generative AI impacts resolution efficiency. Get data-driven insights, ROI benchmarks, and strategies to close the AI performance gap.
SolarWinds Day is now available on demand - See how SolarWinds AI predicts issues before they strike. Watch the Keynote for major updates, then dive into THWACKcamp sessions with experts on optimizing systems, managing databases, resolving tickets, and hybrid IT operations.
The whitepaper discusses Observability Solutions for Proactive IT management, detailing strategies and tools for effective system monitoring.
In this Webcast, SolarWinds will dive deeper into how you can leverage artificial intelligence, automation, and modern user experience to crush your SLAs and ensure exceptional service delivery every time.
Operational resilience isn't just a buzzword; it's a critical component of a healthy business. Join Operational Resilience in 2025: Global and Regional IT Trends, a 30-minute session to learn the biggest barriers to resilience and how to overcome them.
Join Operational Resilience in 2025: Global and Regional IT Trends, a 30-minute session to learn what steps you can take to strengthen your organization in the year ahead.
IT teams are under pressure to do more with less. This session shows you how to make that a reality. Raj Pandya (solutions engineer) and Lauren Okruch (senior product marketing manager) will walk you through practical ways to route tickets instantly using smart automation and eliminate delays with artificial intelligence (AI), dynamic forms, and integrated knowledge.
Effective artificial intelligence (AI) implementation in IT service management isn’t just adding technology. View our Webcast, Actionable ITSM Strategies to Drive Towards the “Effortless” Experience, to get insights into the sources of chaos and complexity.
Explore how DBAs are adapting to rising complexity and AI adoption. This report reveals key trends, risks, and strategies shaping the future of database management, and what separates high-performing teams from those falling behind.
Agile and DevOps accelerate app delivery, but database management often lags behind. This paper shows how unified observability, automated CI/CD, and closer Dev-DBA collaboration bridge that gap—improving speed, reliability, and resilience.
Modern IT generates more signals that teams can interpret. This eBook explains how leading organizations reduce cognitive overload by unifying operational context, reducing alert noise, and introducing safe automation across hybrid and multi-cloud environments.
Get 20 ready-to-use automation recipes for SolarWinds Service Desk, covering triage, routing, SLA management, and more to reduce resolution times and eliminate manual work.
This document provides an introduction to SolarWinds services for US K-12 Education. As agencies move toward "Zero Trust" security models and navigate the complexities of "Secure by Design" initiatives.
Get the insights from 750+ IT pros on where monitoring and observability fall short.
Find out how AI is transforming incident response, visibility and operational resilience.
Unlock strategic AI with this framework that helps you ditch manual fatigue by categorizing IT tasks into four high-impact zones, from the "Agentic Sweet Spot" to expert human-led architecture.
Network discovery refers to the identification of devices available on a network to ensure their validity.
Network devices facilitate data transmission and manage digital connections on a computer network.
Do you know how to troubleshoot network issues? Learn about network troubleshooting steps and best practices.
Discover the nuances of network protocols, the OSI model layers, and the function of protocols in each OSI model layer.
Network nodes are the endpoints, communication, or redistribution points over a network that can receive, create, store, and send data along distributed routes.
Network configuration compliance refers to implementing the proper controls, policies, and device settings to safeguard your network from attackers and comply with the latest industry requirements for standards like HIPAA and PCI DSS.
In everyday language, a query is simply a request for information. Similarly, the meaning of a query in database management is a request for data. If you need to access, manipulate, delete, or retrieve data from your relational database, you’ll need a database query written using a specific syntax.
MIB is an organized, up-to-date repository of managed objects for identifying and monitoring SNMP network devices.
Agentless monitoring helps you monitor your overall network health without deploying any third-party agent software.
Uptime is a metric used to measure the availability of a website or business application.
Ping is a powerful TCP/IP command designed to help track and resolve connectivity issues between two or more networked devices.
Your complete guide to operating system concepts, types, features, examples, and more.
Windows Server is a group of operating systems to support enterprises and small and medium-sized businesses with data storage, communications, and applications.
Network Backup is the process of replicating business-critical data to ensure data is always available.
It's the process of ensuring smooth and optimal database performance by using varied techniques, tools, and best practices.
Remote desktop services (RDS) is a technology that enables users to connect to a remote computer's desktop and programs over a network connection. This allows users to work on a laptop far from the desktop as long as they have internet access and the right log-in credentials. With this technology, an IT department can manage, troubleshoot, update, and maintain various computers remotely and centrally.
CPU utilization indicates the amount of load handled by individual processor cores to run various programs on a computer.
Network access control includes the security policies designed to control network access, such as authorization controls and authentication checks.
A collection of technologies that help efficiently manage network traffic by setting priorities for critical resource-intensive applications within the network.
An access control list is a list of permission rights used to assign roles and responsibilities.
Learn about how RBAC can help with automating user access rights management, minimizing risk, securing data, demonstrating compliance, and improving cybersecurity.
What you need to know about remote access, protocols, benefits, key considerations, and more.
Amazon CloudWatch is a monitoring, observability, and management service designed specifically for site reliability engineers (SREs), IT, and DevOps teams.
Network infrastructure is the broader collection of fundamental components that work cohesively to run an IT network.
An Oracle database is a fully configurable and scalable enterprise database solution that uses a relational model for information management.
A network administrator proactively identifies and resolves a computer network's security, reliability, and performance issues.
Database performance management system is designed to help admins more easily troubleshoot and resolve DBMS performance issues by monitoring performance and providing root-cause analysis of your database using multi-dimensional views to answer the who, what, when, where, and why of performance issues.
An index helps in rapid access of database records by storing pointers to their actual disk location.
Managed file transfer (MFT) protocol includes automation capabilities to help companies securely share various types of data over the internet.
Network optimization leverages a variety of strategies, tools, and programs to improve network performance.
Application infrastructure refers to all the software and hardware assets necessary for the smooth functioning of your application.
Database concurrency is a unique characteristic enabling two or more users to retrieve information from the database at the same time without affecting data integrity.
SQL Server index fragmentation is an overarching problem arising from an excessive number of alterations in the database.
Remote Desktop Protocol (RDP) enables users to remotely access and control physical and virtual devices running on Windows.
Hyper-V is a Microsoft virtualization product allowing you to create and run multiple VMs on a physical host.
Packet capture is a networking practice involving the interception of data packets traveling over a network.
Network congestion refers to the reduced quality of service that occurs due to overloaded network nodes or links.
Explore how to identify, analyze, and troubleshoot packet loss issues.
Windows Server Update Services (WSUS) definition, how WSUS works, and learn how to deploy it efficiently.
Network capacity quantifies the maximum amount of data that can be transmitted over a network from one point to another.
Find out what network bandwidth is and how to optimize and increase your network capacity.
Do you know what network configurations are and how to automate configuration management using tools? Learn how to start managing your network efficiently.
The Windows event log records specific events related to the system, security, and applications on a Microsoft system.
Your complete guide to website monitoring concepts, types, tools, and more.
Learn more about virtual machines (VMs), including what they’re used for, types of virtual machines, and differences between VMs and virtualization.
Subnetting is the process of logically dividing an IP network into more subnetworks.
What you need to know about standard protocol enabling network devices to interact with a logging server and exchange event data.
SSL certificates are small data files designed to strengthen the overall website security through strong encryption and identity verification methods.
Your intro to a popular data analytics solution.
Know the value of each OID on a device instantly.
SNMP traps are unrequested notifications an SNMP agent of a managed device sends to an SNMP manager in the network.
Learn about automating SharePoint permission rights, simplifying management, providing safe access to data, and demonstrating compliance.
Advanced persistent threat (APT) is a planned, stealthy cyberattack that allows attackers to penetrate a company's network and stay inside for a prolonged duration to exfiltrate valuable information.
Learn about server infrastructure, server types, and the importance of monitoring and identifying server performance issues in real time.
Learn how to aggregate, correlate, analyze, and monitor security logs and events to prevent and mitigate security threats.
MariaDB is a secure enterprise database system using pluggable storage engines to store and manage different types of data.
Network visualization allows you to pictographically showcase the network architecture, including device arrangement and data flows.
SQL performance tuning, or performance tuning, is checking and resolving issues potentially affecting the efficiency of a SQL database.
Track the performance and capacity of your storage arrays with Storage Resource Monitoring (SRM) to keep tabs on any storage-related issues slowing your system down.
Learn more about identifying network devices, including how to identify unknown devices and identifying devices on wireless networks.
HTTP is a standard protocol enlisting the recommended guidelines and procedures for exchanging information over the internet.
Linux® server refers to a specific type of server based on the free, open-source, and modular Linux operating system.
Outage, human errors, failure of equipment, or ongoing maintenance can cause network downtime. Find out how to reduce and avoid it to minimize business losses.
Understand the difference between Syslog Server and SIEM solution.
Learn more about the basics of database monitoring, including why monitoring, optimizing, and tuning database performance is crucial.
IPv6 is the revised version of the Internet protocol designed to overcome the IPv4 limitations and address exhaustion problem.
Network metrics are qualitative and quantitative ways to observe and determine network behavior.
Learn how to streamline access to critical data by optimizing organizational data storage policies.
Learn more about IIS, including what it’s used for, benefits, and how to configure IIS web servers and virtual directories.
A security mechanism that analyzes critical system files to check unauthorized modifications and cyberattacks.
File-sharing security is all about utilizing the right set of file security tools, transfer protocols, and procedures while exchanging sensitive business documents inside or outside the company network.
What you need to know about the FTP server process, types, benefits, and more.
Learn more about enterprise networking, including the components, architecture, and monitoring best practices.
Network availability, also referred to as network uptime, denotes the overall duration for which the clients can seamlessly access the resources, such as servers and printers, available on a computer network.
Learn about network administration, including key areas of focus, what a network admin does, and differences between a network admin and a network engineer.
A domain controller is a server computer that authenticates and validates user access on a network.
Network activity monitoring helps identify bottlenecks impacting overall network performance, health, and uptime.
It’s a logical collection of websites or applications served by one or multiple worker processes with the same configuration.
DDI is an abbreviated term that refers to the amalgamation of DNS, DHCP, and IP Address Management into a single service or solution.
Monitor, analyze, and optimize cross-platform database performance.
Database cardinality can be defined as the relationship between tables consisting of elements in a set.
Cyberthreat intelligence provides critical knowledge about existing and evolving cyber threats and threat actors.
Bandwidth consumption happens when a node connects to and exchanges information over a network.
Active Directory (AD) groups help keep a tab on the access permissions to various resources in your network, such as computers.
Active Directory can be used for the management of user permissions and access rights.
A Service Desk is the central point of contact between IT and end-users within an organization. It supports the entire IT service management (ITSM) lifecycle, handling incidents, service requests, problems, and changes to ensure that IT services align with business needs. The ultimate goal of a service desk is to drive productivity and satisfaction across the organization by delivering high-quality IT services.
AI in IT Service Management (ITSM) is the use of artificial intelligence technologies, including machine learning, to automate and enhance IT service delivery and support processes. This includes employing AI tools to streamline tasks, improve efficiency, and provide better user experiences.
Network visibility means monitoring and understanding all network activities in real-time to ensure smooth, secure, and efficient operations.
Learn about IT assets, including information about managing IT assets and why IT asset management is important.
Everything you need to know about configuration drift and more.
Learn the definitions of SCP and SFTP, their differences, common use cases, and more.
SQL Server is a relational database management system used to store, manage, and retrieve data efficiently.
Find out about MFT vs. SFTP, including their key differences, common use cases, and which one is right for you.
Learn about the role, importance, and best practices of ITOM.
Learn about what change management is, its best practices, and the types employed by organizations.
SFTP (SSH File Transfer Protocol) allows for the secure transfer of files over remote systems.
File transfer protocol with Secure Sockets Layer (SSL) definition.
Learn about data observability’s benefits, importance, and more.
Learn about hybrid cloud solutions, architecture, and benefits.
Learn about ESM’s importance, objectives, and best practices.
What you need to know about protocol analyzers, their benefits, and more.
Learn about bandwidth management and bandwidth control.
Cloud computing allows companies to rent software, data storage, and other IT resources instead of managing them in-house.
A container is a lightweight package that includes code and dependencies together.
A complete guide to log management best practices to help you collect, organize, and monitor logs effectively.
Learn about remote monitoring and management, its benefits, and more.
Learn about the benefits and importance of centralized log management.
Discover what secure remote access is, key strategies, and more.
Incident management is a process within IT service management (ITSM) aimed at restoring normal operations as quickly as possible when disruptions occur.
Learn about knowledge bases, including how to build and maintain a knowledge base.
Learn about SLAs, including different types, how to manage them, and why it’s important.
IT service management (ITSM) is the set of processes and activities involved in planning, designing, delivering, managing, and maintaining IT services. ITSM ensures the appropriate people, technology, and processes are in play to strategically optimize service delivery, improve business processes, and enhance user experiences.
A CMDB is a crucial part of the ITIL framework. It enables organizations to manage, control, and configure assets.
Learn more about help desk solutions, including why they’re important, the difference between a help desk and a service desk, and how to optimize help desk workflows.
ITIL service catalog is a systemic record providing visibility into your organization's active IT services.
Learn about IT service management systems, including how modern ITSM platforms work and what features to look for to advance your service ticket support and delivery.
The network of smart devices embedded with sensors, software, or any other technology to exchange data over the internet.
IT risk management involves policies, procedures, and tools to identify and assess potential threats and vulnerabilities in IT infrastructure.
Learn about the process, challenges, and best practices of compliance monitoring.
Learn about the significance of application logs in software development and how to conduct effective log analysis.
Learn about the significance of network traffic monitoring for a more efficient IT environment.
Dive into the essentials of serverless architecture, from its core concepts and benefits to the challenges and comparisons with other models.
Explore syslog severity levels and their importance in log management.
Learn about the structure, types, and importance of the syslog format.
Learn how to monitor NGINX with metrics, logging, and insights.
What you need to know about Apache Cassandra monitoring, its best practices, and more.
Learn about brute-force attacks, their types, and how to protect against them with strong passwords and multi-factor authentication (MFA).
Explore the essential role of servers, from web and email to database and application services, in supporting modern digital infrastructure.
Learn how problem management enhances IT reliability and improves service delivery.
Dive into the details of the DNS hierarchy from root servers to subdomains and learn how it simplifies internet navigation and domain resolution.
Discover the role of change agents in driving innovation and aligning IT with business goals.
Learn how IT infrastructure management optimizes business operations, security, and scalability.
Learn about SSH, its history, key security features, and how to set it up for secure remote access and file transfers.
MySQL is a popular open-source enterprise database solution that relies on the relational data model for data storage and management operations. Oracle, Amazon AWS, and other vendors offer proprietary commercial versions.
Learn more about Zero Trust, including how it works, its architecture, and the benefits of a Zero Trust security model.
Virtualization technology creates simulated environments based on physical systems to enable optimal and flexible resource utilization.
Network automation is the process of automating the management of a network’s physical and virtual devices using software to maximize efficiency.
A technique commonly used in phishing attacks and spam to trick users by sending emails from a forged sender address.
A comprehensive guide to database software concepts, types, examples, and performance monitoring.
A reverse proxy facilitates seamless communication in a client-server architecture with intelligent traffic routing, filtering, and distribution.
OSI layers enable standardized, reliable communication between two or more network devices.
A relational database allows you to easily find, scan, and sort specific information based on the relationship among the different fields defined within a table.
NoSQL databases store and retrieve information in a nontabular format, unlike relational databases.
High availability indicates a system's capability of being resilient to known or unknown failures.
End-user network experience monitoring allows teams to assess the impact of network performance on end users' experiences.
DHCP intelligently manages IP address allotment and renewal activities in a network.
An insider threat is a user with authorized access to sensitive company assets or data who may misuse their access rights to compromise the organization's security.
Learn more about software-defined networking (SDN), including how it works, implementation, benefits, and differences between SDN and traditional networking.
Network topology offers a diagrammatic explanation of the logical and physical setup of different components, such as routers and switches, in a network.
Vulnerability investigation or assessment is a systematic approach to identify the security loopholes or weak points in your IT infrastructure and take active measures to resolve them quickly.
Your complete guide to APM concepts, capabilities, tools, and more.
A Wi-Fi heat map is a visual representation of Wi-Fi signal strength that provides visibility into your network and coverage.
Read about root cause analysis, its methods and benefits.
A complete guide on cybersecurity types and best practices to help you safeguard against common types of cyberattacks.
A network sniffer is a tool that captures and analyzes data packets as they travel across a computer network.
Observability provides proactive insights, automated analytics, and actionable intelligence from collected data.
Learn what DNS resolution is, how it works, the types of DNS servers involved, and why it’s essential for internet connectivity.
OpenTelemetry is an open-source observability framework for standardizing the collection and export of telemetry data.
SD-WAN is a software-based network technology that offers a modern, flexible, and more effective way to administer wide-area networks.
Traditionally, application code was developed in a specific computing environment. Relocating application code to another environment, such as from computer systems to virtual machines, often resulted in bugs and errors. Containerization removes this problem by isolating application code and dependencies in an isolated user space known as containers.
AWS CloudTrail is a service that tracks activity within an organization's AWS environment. Learn about CloudTrail features and benefits.
ITIL is a set of best practice guidelines focused on aligning the delivery of IT services with business goals.
Learn about computer hardware, including the importance of monitoring hardware in enterprise and data center environments.
Learn about VLAN, including the different types of VLAN, managing and configuring VLAN, and key differences between VLAN and LAN.
Network monitoring is a critical IT process to discover, map, and monitor computer networks and network components, including routers, switches, servers, firewalls, and more.
Real user monitoring (RUM), also known as end-user experience monitoring, provides visibility into real-time problems affecting the experience of users while navigating your website.
Learn more about synthetic monitoring, including different types of synthetic monitoring.
Learn more about web servers, including how web servers work, what they’re used for, and key differences between web servers and application servers.
What you need to know about SQL database structure, types, benefits, performance metrics, and more.
Classless Inter-Domain Routing (CIDR) refers to the standard process of efficiently allocating and organizing IP addresses across networks and devices.
Distributed tracing is vital for managing the performance of applications that use microservices and containerization.
A database schema is the structure or organization of data in a database management system.
What you need to know about Microsoft SQL Server Integration Services (SSIS), SSIS packages, and SSIS monitoring.
Kilvington Grammar School partnered with SolarWinds on tailored monitoring, reducing unplanned downtime by 50%. This empowered staff to identify issues instantly, ensuring smooth adoption and improved service reliability for the school community.
Get a 5‑minute snapshot of DBA burnout from the 2025 State of Database Report. Learn why this growing challenge impacts resilience and why leaders must act now.
SolarWinds Head Geeks dive into setting up Dameware Central Server and its remote features - from mobile remote desktop access to Web Help Desk integration and every Central Server remote tool in between. Learn how Central Server can help with license and user management. Free trial!
SolarWinds Database Performance Analyzer provides performance tuning and optimization for Azure cloud databases, and it can be deployed in Azure.
Over the past decade, as Gaylor Electric transitioned from an on-premises data center to a modern private cloud environment, they faced the challenge of gaining unified oversight of the increasingly distributed environment. Their infrastructure utilized a hodgepodge of monitoring tools across three principal IT support locations and on managed servers running software as a service (SaaS) and platform as a service (PaaS) solutions in a virtualized private cloud.
Kiwi CatTools is a configuration management and network automation tool for network devices that saves time and reduces errors by automating common tasks, including backups and roll-outs.
IT organizations face the challenge of adapting to rapidly evolving
technology trends such as the Internet of Things (IoT), artificial
intelligence (AI), IT service management (ITSM), and cybersecurity.
Gain visibility across your environments (across networks, infrastructures, applications, and databases) to reduce the time needed to detect, alert, and remediate security incidents on a single pane of glass.
The GigaOm report, Driving Better Outcomes with APM and Observability, reviews the state of play for organizations considered actively cloud-native.
This whitepaper explores the strategic implementation and management of multiple enterprise database environments. It uses the latest industry studies to look at trends and options to guide managers responsible for diverse database platforms.
This eBook is designed to discuss virtualization realities from the age-old debate of on-prem vs. cloud vs. hybrid (Spoiler… nearly everyone is hybrid) to newer technology like containers.
This whitepaper will identify three components of network performance to look at when you get a demand for more bandwidth.
SolarWinds is a leading provider of powerful and affordable IT management and monitoring solutions. We help eliminate complexity from your infrastructure network and data center operations, systems management, cybersecurity, and IT services management—so you can do more with less.
The adoption of platforms like Kubernetes has grown as DevOps teams build scalable applications. Monitoring in complex environments with many pods is challenging. Smart automation, incorporating dynamic monitoring, is key. Join Kevin Kline to learn about SQL Server automation and monitoring.
Enhancing Operational Agility in Complex Battlespaces
Most organizations are partway through a cloud journey, with many aiming at a hybrid cloud outcome. Observing and managing IT during migration is a challenge. This eBook explores how SolarWinds Observability Self-Hosted can help your cloud migration succeed.
SolarWinds and partner Skyline Technology Solutions provide solutions to improve traffic conditions and enhance citizen safety
We decode the Observability Dilemma, emphasizing the importance of Observability in shaping your organization's tech ecosystem. Take a look at the advantages and limitations of SaaS and self-hosting solutions.
Only 1 in 10 enterprises adopted an observability strategy in 2020. By 2024, Gartner predicts that number will triple among companies progressing cloud-based architectures.
With virtualization ubiquitous across servers, have you considered the impact on the applications running on them? This webcast will discuss how SolarWinds is bridging the gap between the virtual admin who is responsible for the VM infrastructure and the DBA who is responsible for databases running in virtual machines.
Many companies are applying observability, but it is often in a fragmented and siloed manner. Adopting a unified observability strategy is key to accelerating problem identification in a hybrid IT environment and opening up new use cases, including those that serve IT leaders.
Learn how a public sector network team built a flexible, comprehensive monitoring solution with a tight budget and a small team on the SolarWinds Platform.
As a service desk, the IT department at J.F. Brennan Company had users submitting requests multiple ways. Some requests were going to one member of the team, others to multiple members of the team, or the incident would go unreported altogether. “With over 300 employees, our tracking system of spreadsheets, databases, and emails could not keep us on top of our tasks or bigger projects,” said Caleb Rose, IT coordinator.
Learn how SolarWinds Patch Manager automates the patching process of 3rd party applications that includes researching needed patches, obtaining and running the update installer, documenting the pre & post-installation conditions, creating a package with metadata about the update and post-installation conditions, publishing the package to SUP, synchronizing to the site server, and building a deployment package. System Center Configuration Manager™ provides the ability to update third party patches using SCUP (System Center Updates Publisher).
Troubleshoot application performance issues faster and reduce downtime.
This video briefly demonstrates how to set account limitations and permissions in Orion and provides best practices in which permissions should be enabled for administrators and users.
The SolarWinds® Orion® Platform and its modules are now Azure Certified applications and available in the Microsoft® Azure Marketplace.
SolarWinds® Access Rights Auditor is a standalone free tool, designed to scan your file system and evaluate potential security risks due to user access rights.
This video (3:29) demonstrates how to set up user permissions and provides best practices on which permissions should be enabled for administrators and users.
This video (2:30) demonstrates how to set up user permissions and provides best practices on which permissions should be enabled for administrators and users.
This video (4:26) will show you how to add new pollers and assign pollers to devices.
This video will demonstrate how to add resources to a view, rearrange resources in columns, and edit charts and graphs.
Learn how to configure File Integrity Monitoring (FIM) capabilities in SolarWinds Security Event Manager (formerly Log & Event Manager).
This video (3:58) will demonstrate how to manually add a node that you want to monitor instead of using Network Sonar Discovery
This video (4:11) will demonstrate how to create views - add resources to a view, rearrange resources in columns, edit charts and graphs - and how to limit views.
In this video, we’ll introduce you to the top three features of SolarWinds Kiwi CatTools.
SolarWinds shows you how to protect yourself from internal security threats by analyzing user access to services and file servers with visibility into privileged accounts and group memberships from Active Directory® and file servers.
Learn how to use the SolarWinds SNMP Walk tool to troubleshoot Orion server issues and collect SNMP walk data.
This video (9:50) demonstrates how to build a map using a tool is called Network Atlas, which is included with Orion products such as Network Performance Monitor or Server & Application Monitor.
Stop the blame game, with a shared view of the truth on the relationship between DBAs, IT admins and developers, and how Database Performance Analyzer helps bridge that gap.
SolarWinds® Access Rights Manager (ARM) allows you to clean up directories with direct permissions as bulk action.
Learn how to enable Smart Card logon and authentication with Dameware Remote Support and Mini Remote Control.
This video covers how to install and configure Real-Time File Integrity Monitoring
This video (4:52) demonstrates how to build more advanced alerts by adding a timer to the alert logic as well as adding new logic sections. In adding timing, you can have the alert trigger after a condition has been met for a period of time.
This video demonstrates how to add network objects to the database for monitoring using the Orion Platform Network Sonar Discovery wizard.
Watch and learn how to create a scheduled discovery job in NPM.
This video demonstrates how to create a new view, customize views, and manage views for Orion Platform v2016 and above.
This video (14:22) shows the steps on how to create a custom report using the reports builder in the Orion web console.
This video (3:17) demonstrates how to set up user permissions and provides best practices on which permissions should be enabled for administrators and users.
Learn how to create correlation rules with Security Event Manager (formerly Log & Event Manager).
This video will show you how to quickly and easily create an action rule that can help automate processes and workflows.
Find out about all the great resources available to help you be successful with your SolarWinds products.
Dameware Remote Everywhere is a simple, easy to use, cloud-based remote-support solution developed to help IT professionals resolve issues quickly.
This guided tour of Dameware Remote Support and Mini Remote Control 11.0 shows the Dameware Central Server and Internet Proxy in action. Securely support end-users from an easy-to-use console.
Dameware® Remote Support is an affordable and easy-to-use remote support software designed to simplify and accelerate remote IT administration tasks for IT admins and support technicians.
The cross-platform solution for performance monitoring for both cloud and on-premises databases.