Category Archives: Network Management

Asian Internet Profile 2009 to Feb 2017

Based on MLab Data 2009 to 2016

Future Gen to Participate in RootCon 2016

RootCon 2016
RootCon 2016

Watch Mr Wilson L. Chua present actual cases at the Root Con 2017 event in Tagaytay, Philippines where Big Data Analytics was used to help uncover hacks and attempts.

Cases showcase how descriptive and predictive analytics can be used to help network admins present their analysis in a graphical and more intuitive format – one that helps C-level executives more easily understand and grasp the complex landscape.

Big Data Analytics Applied to Network Operations @ PHNOG event

PHNOG Conference 2016
PHNOG Conference 2016


The Department of Science and Technology – Advanced Science and Technology Institute (DOST-ASTI), in partnership with the Philippine Network Operators’ Group (PhNOG), and Trans-Eurasia Information Network (TEIN) Network Cooperation Center (TEIN*CC) will be conducting a one (1)-day Conference with the theme ‘”All over IP’ (AoIP) – touching the different facets of Internet, entwined to our daily lives” on 25 January 2016 at the Marriott Grand Ballroom, Marriott Hotel Manila, Pasay City, Metro Manila.


1100 Big Data Analytics Applied in Network Operations Wilson Chua
1130 IXP Next steps (advantages and disadvantages) Daishi Shima/BBIX
1200 Lunch break
130 Management and Sustainability of the IXP – taking it to the next level – Global Examples / DNSSEC Jane Coffin/ISOC, Kevin Meynell/ISOC
200 Internet enabled businesses (challenges/milestones) Rhett Jones/Rise
230 CDNs and Internet traffic Analystics Kam-Sze Yeung/Akamai
300 Role of a Peering Manager Jake Chin/Google
330 Break time
400 Network Security Mon Nunez
430 Internet BCPs Amante Alvaran/Brocade
500 Evolution of the Network Engineer Job Role Ceejay Dideles
530 IOT Benjie Tan
600 Closing


Said activity aims to gather participants from the R&D and IT/ICT communities together with the current PhNOG members to discuss the opportunities that can be derived from joining and using the TEIN Network. TEIN is a high speed international research network which provides access to researchers and research institutions within participating countries in Asia and Europe. Through TEIN, international joint research projects pertaining to climate change, remote medical service, remote cultural performances, agriculture, and information technology have been conducted. Local and foreign experts will also share their knowledge and experiences that will enable the continuous development of the Philippine Internet.

On the other hand, Philippines Network Operators Group (PHNOG) is a nonprofit organization established to promote coordination among Network Operators in Philippines. Focus is given to knowledge development of all members as well as the Philippines IT community as a whole through discussions on technical issues/concerns regarding the Internet and network management.

In line with this, we would like to invite you as one of the participants in this one (1)-day activity. Registration for this activity is free. Please take note that the activity only offers limited slots, which will be granted on a first come, first served basis. Deadline for registration is on 15 January 2016. To reserve your seat, kindly register at this link:

Should you have any clarifications, please feel free to contact Mitz Ann N. Montañez at or Marie Antoinette F. Bangabang at You may also call +63 2 4269760 loc. 1603 / loc.1408.

– See more at:

When to Outsource?

People usually think that companies outsource some of their functions to save on money. While this has been true in the early days of outsourcing where companies enjoyed the savings from properly implemented plans, they  have also realised some additional benefits from outsourcing. Generally, when either one or more of the following occurs, it is best you consider Outsourcing as a viable option:

  1. Vacant positions are open for a long time.
    Your HR is facing a dwindling pool of qualified people for the open positions. In a tight labor market, outsourcing lets your HR source from a wider pool of potential star performers. You won’t be limited to hiring from your immediate vicinity.
  2. Uncertainty with Market conditions. 
    Management would like to have a more flexible and nimble operation that is not weighed down by a high fixed headcount. Think: Peak and low seasons. It is nice if you can forecast the future growth of your operations, and maintain your staff, but what happens in a downturn? It is easy to hire, and sadly, hardest to fire/layoff people.  By outsourcing your spillover work, you maintain that flexibility and are relieved of having to lay off extra workforce in low seasons.
  3. Quicker time to Market.
    Sometimes your project/s needs that top talent and you can’t wait to train/develop your in-house talents. Outsourcing enables your company to tap on the expertise and specialization of outsourcing companies in what they do best. Your in-house talents can work beside your outsourcing provider and hopefully, your inhouse talents can absorb the best practices and accelerate their own expertise.
  4. Minimizing Operational Risks.
    Sometimes, it just makes sense to ‘not put all your eggs in one basket’. Outsourcing enables your company to spread your manpower over geographic distances. This makes a lot of sense when the next global pandemic or catastrophe hits your main operating region.

Easy to Deploy Security Appliance

Untangle unveiled today its new pricing for its plug and play line of easy to deploy security appliance. Untangle keeps your systems running smoothly and your users happy and productive.

Security appliances are more cost effective deployment option. The discounted hardware and software renewals mean you are getting the best possible value for money. These come priced without any User band limits, so you don’t have to worry about incurring incremental costs. One price for all users!



For Pricing Details check out Untangle Website.


You can also avail of our 24×7 security monitoring service.

Cloud Hosting Security and MSSPs

John Sawyer wrote about security implications of being hosted in the cloud  in “Spot the Trouble in the Cloud” for InformationWeek. He highlights the security challenges for cloud based hosting. In particular:

“…enterprises are flying blind unless they adapt their security monitoring, incident response and digital forensic policies and procedures to the cloud… most cloud provider SLA state security is up to the customer”.

The steps to mitigate this challenge is to start monitoring. Enable system logs and send them over to your syslog server. Alternatively Mr Sawyer suggests the use of services like Loggly or products like Splunk, Tenalbe’s SecurityCenter and Log Corrlelation for your log management analysis.

In addition, you could outsource the monitoring to a dedicated team of professionals to notify you of any incidents that would otherwise escape your attention. You can also incorporate such a team into your incident handling policies and procedures. These teams are called Managed Security service providers (MSSPs).

Some of the security tasks MSSPs undertake on your behalf:

  1. System Patch management
  2. Malware detection and analysis
  3. IPS/IDS Incident Response
  4. Identity and password management
  5. Log analysis
  6. Researching new threats
  7. Writing or preparing reports for audit teams

Contact to see how you can benefit from our MSSP offerings and secure your data today!

Monitoring Service Expanded to cover Video

Since our team is monitoring networks on a 24×7 basis we decided to extend the service to cover also the video monitoring. A lot of video cameras are now hooked up to DVRs with internet capabilities. It would be simple for us to login and monitor the DVR from our NOC. By providing the service, our team can help owners and managers save time and manage the video review process.

The Video Monitoring service is envisioned to provide peace of mind to property and business owners with 24×7 staff keeping tabs on the remote video feed from newer generation Digital Video Recorders that have internet capabilities. Our team can also help plan the optimal location and aim of the various types of dome cameras for maximum coverage. Instant alerts are provided for every notable ‘incident’. This service can be rendered worldwide.

Our original network monitoring service covers network equipment and servers.

Network Security Product Update

We just wanted to give you a quick update on happenings at Untangle.

Upgrades to 6.2 continue to roll and will likely finish by June 12th. The ISO should be available sometime late this week or next. If you were not able to make the 6.2 Partner Overview Webinar, you can view the recording at

 i) WAN Balancer and WAN Failover data sheet (New)per Bundle includes all of Untangle’s commercial applications and services for a single, low cost subscription. Annual and monthly pricing is available.

ii) Untangle Software/Super Bundle data sheet (New)

iii) Professional Package data sheet (update)

iv) Education Package data sheet (update)

v) Price List (update to include new applications and bundles)

ITIL v3.0 Hosted Solution

Live and Dynamic Inventory

Automatically obtain a complete inventory of your network and computer equipment without any installation on workstations. Also Tracks license details and supplier warranties on your assets. Properly document your changes in our hosted database.

6 ITIL v3.0 Processes
Incident Managment, Change Management, Problem Management, Configuration Management, Service Level Management, and Event Management

On Demand solution
No initial investment needed. Pay only 50 USD per month per IT user.
No infrastructure to setup, hosting is provided by us.
Always accessible anywhere, any time!

Great Reporting Tools
Performance indicators, dashboard, statistics with filtering and data mining features.

30 day Trial
The 30 day trial provides you with a full and unrestricted access to our hosted solution. You may create an unlimited number of IT users.

More Details on the ITIL V3.0 Process Solution:

Incident and service request management
The purpose of the following functionalities is to help document and resolve daily incidents and requests in the most efficient way possible.

Compatible with ITIL-based incident management
Service center (Service Desk) function
Web portal for users
Web portal for technicians
Automated follow-up with emails to users
Full integration with problem management, change management and CMDB
History of incidents associated to a user
History of incidents associated to a piece of equipment or software (CI)
Incident templates and quick calls
Detailed log of resolution activities
Breakdown of incidents and service requests into “sub-requests”
Service level agreement with automatic escalation using emails and visual indicators
Unlimited attachments
Pre-configuration with real data (categories, types, priorities, codes)
Statistical reports, dashboard, graphs, performance indicators and data extraction in Excel
Automatic creation of incidents from emails
Notifications by email for important events
Multiple Service Desks support

Inventory and configuration (CMDB)
The primary objective of the following functionalities is to organize all relevant information concerning your equipment and software so that you may know at all times what your inventory is and what is the status of each component of your infrastructure.

Based on the ITIL CMDB concept
Pre-configured with over 20 CI types (hardware, software or logical types)
Fully configurable, possibility to add :
CI types
Relationship types
CI attributes
CI status management
CI location management
Management of users relying on a CI
Management of dependencies and relationships between CIs
Automated inventory of servers, workstations and installed software
CI criticality level indicator
History of incidents associated to a CI
Lease contract management and purchase information
Service contract management with notification prior to expiry
Preventive Maintenance
Parts management
CMDB change monitoring tools
Document management in the CMDB with indexing and search

Problem management
The purpose of the following functionalities is to document and to resolve recurring and complex problems which compromise the performance or undermine the stability of your infrastructure.

Compatible with ITIL-based problem management
Impact, cause, workaround and permanent solution management
Sharing of known errors and workarounds
Association of a problem to its associated incidents
Association of a problem to the CI in cause
Automatic closure of related incidents when a problem is closed
Detailed activities log
Relationship with the souce change (RFC) and with change for the permanent solution
Tool facilitating the correlation of incidents to problems
Tool for identifying the most problematic CIs
Possibility to mark incidents as “potential problems”
Email notifications to publish known errors
Unlimited attachments

Change management
The purpose of the following functionalities is to document and to monitor the changes made to the components of the infrastructure in order to ensure smooth operation and to minimise impacts on the services offered.

Compatible with ITIL-based change management
Management of the change implementation steps using tasks
Notifications for task assignments
Management of estimated effort, remaining effort and actual effort
Detailed activities log, by change and by task.
Documentation of impacts, required resources and authorizations
Change advisory board (CAB) approvals
Detailed activities log
Approvals management
Unlimited attachments

Event management
Event management aims to ensure the follow-up of all events or alerts which occur throughout the IT infrastructure in order to detect and efficiently process problematic situations.

Compatible with ITIL-based event management
Notifications to IT staff
Detailed activities log
Creation of events from emails

Knowledge management
These functionalities enable to manage and share your knowledge.

Knowledge base with attachments and full-text search
Incident history search
Problem history search
Solution search function integrated to incident management

Web portal for users

Possibility to submit incidents and service requests
Incident follow-up
Possibility to send messages to the service center
Log of communications with the service center

For managers
These functionalities enable the manager to measure the performance of the service center and of other support processes.

Dashboard providing a quick overview of the current workload
Table of services currently affected by incidents
Comprehensive statistics on the respect of resolution targets (SLA)
Statistics on the delays for incidents and requests to be processed and to be resolved
Integrated report tool enabling to efficiently search and present data
Escalation in the event of an SLA breach
Performance indicator report

Unique user experience
Clever design, modern look and feel
Support for multiple windows displayed in tabs
Reminder functionalities
Spell-check in all text fields
Integration with email software for sending emails from within an incident
Integration with remote access software
PC Anywhere
Remote Desktop
Dame Ware and many others
Easy to configure data lists
Automatic update downloads

Download our Network Offerings Brochure