The Real Time
Dependency Mapping Blog
How Network Microsegmentation Can Protect Data Centers
Those who still rely on perimeter controls to protect their data centers probably already know that their security solutions are in need of updates. In [...]
A Cloud Migration Checklist to Get Started Successfully
The cloud has arrived, and it is here to stay. If you have not already moved your infrastructure, applications, and data to the cloud, you [...]
Subscribe to our blog
Sign up to get the latest news and developments in network discovery and visibility, and stay in the know about all things Faddom.
* These fields are required.
An Introduction to Network Mapping Tools + Faddom’s Free Software
These days, all companies need a well-functioning network. Outages, overloads, and bottlenecks [...]
Agentless Scanning vs. Agent-Based Scanning in Application Discovery
Many application mapping solutions use agents for discovery, justifying this by claiming [...]
Active Scanning vs. Passive Scanning in IT Environments and Data Centers
Whether it is called periodic scanning or active scanning, the fact is [...]
How to Back Up Hundreds of Virtual Servers to the Cloud
When thinking about cloud infrastructure, I often worry about data security, [...]
What is SNMP?
The Simple Network Management Protocol (SNMP) is a widely used protocol [...]
Goodbye, VNT. Hello Faddom!
We wanted to update you that our company name has changed from [...]
Using Faddom to Identify the Log4J Vulnerability
Overview Recently, a serious vulnerability was found in the popular Log4J library [...]
Data Center Migration: What is It?
Transitioning to a new data center can be a complex undertaking, depending [...]
IT Disaster Recovery: What is It?
Learn What Disaster Recovery Is, Why It’s An Essential Investment For It-Reliant Organizations, And What Goes Into Creating A DR Plan.
Speak to one of our experts today:
* These fields are required.