Questa pagina non esiste ancora in Italiano. Ci scusiamo per il disagio!

Resource Center

Welcome to the PRTG Resource Center where you'll find all of our great content at a glance.
Happy reading and watching!


Monitoring your bandwidth helps to ensure availability of your IT infrastructure. There are four methods: SNMP, Packet Sniffing, Flow and WMI. In our 6 part course, we'll explain how they work and when you should use each one.

Get started >>

The private cloud - just like any other cloud - depends on the efficiency and stability of the IT infrastructure. This means your network monitoring strategy is vital. Learn more about monitoring the private cloud.

Get your copy >>

How to use an ADFS server to authenticate users for AWS. 

Get your free guide now >>

Our offboarding script helps you make sure that employees don't just leave the company; they also leave your system!

Get your free script now >>

New hires, new challenges. Our onboarding script can save you time and energy, and you’ll be less likely to forget a critical step, like organizing a workstation! The script automates a load of standard procedures.

Get your free script >>

What a great subnet mask! Do you know how many addresses are available in this subnet? What about the Classless Inter-Domain Routing (CIDR) notation? And what is .224 in binary?

Get your cheat sheet today >>

Monitoring with SNMP is essential for anyone responsible for servers and network devices, such as hosts, routers, hubs, and switches. Our 4 part course on how to use SNMP for network monitoring will help you improve your network operations.

Get started >>

Our team has developed a new overview on how to illustrate the most relevant terms and terminology of system administration. Categorized into various groups, you’ll find everything from Ai for API, Rt for Router, to Wm for WMI.

Get your periodic table >>

Wait? Don't wait? Clients decide within seconds. You think good things come to those who wait? Well, try to tell your clients when they're gone. If your website fuels your business financially, poor performance can quickly become a sales killer.

Get your free copy now >>

IETF1 developed Simple Network Management Protocol (SNMP) towards the end of the 80s, and it is still in use today by many devices. But why is it still the standard? What are the alternatives? And what does the future hold for SNMP? 

Get your free white paper >>

Even start-ups need to monitor their IT infrastructure, since it is one of their crucial business success factors. Learn more about monitoring your start-up here.

Read more >>

The Internet of Things (IoT) is launching a new era in network monitoring. We give you 10 tips on how to anticipate and prepare for monitoring the IoT. 

 

 

Read more >>

Do you know the different types of headers IPv6 offers? What are the ICMPv6 error message types? And which header field is used by OSPFIGP? Don't panic, you'll find all the answers in our IPv6 Cheat Sheet.

Get your cheat sheet today >>

As a system administrator, our colleagues, supervisors, and customers look to us daily for answers to common questions, like "Why is my email down?". We provide you with 11 solutions to everyday network issues.

Get your free whitepaper >>

Here are 13 ways that you can raise security awareness in your organization, including what technical measures you need to take, and what to do if it's already too late. 

Get your PDF now >> 

Up-to-date and detailed network maps can be indispensable to IT managers. Here are 9 network mapping tools that we reviewed in collaboration with an independent institute.

Get your guide now >>

A good network monitoring solution is essential for a healthy and stable network. But which one is right for you? Our white paper provides you with an explanation and the selection criteria to help you decide. 

Get your copy >>

„Return on Investment“ is intended to provide a simple calculation that determines the period during which an acquisition is amortized. But how does this apply to network monitoring software?

Read more >>

Network management tool consolidation is essential for effective IT operations. This means managing your infrastructure centrally instead of using multiple tools.

Read more >>

Enterprise Management Associates research has identified the key network operations challenges that small to medium enterprises face, and identified the management tool capabilities that deliver the most value for them. 

Read more >>

Choosing the right network monitoring system for you is a case of asking the right questions.  

Read more >>

With worldwide IT spending being on pace to total $3.5 trillion in 2015 (Gartner, 2015) - why does it feel like you can never get the budget ...

Read more >>

The growth of your small- to medium-sized business can put strain on your supporting IT systems. How can you make sure your IT systems evolve with your growing business?

Read more >>

Company productivity in today’s IT age is heavily dependent on the applications and services used within the company.For this reason, these applications and services should be monitored. But how?

Read more >>

The abstract concept of the "consumability" of technical products was conceived by IBM for product development. But how can it be helpful in evaluating software - specifically network monitoring software?

Read more >>

Organizations with infrastructure at multiple sites need to keep track of the network at those locations. Find out how PRTG Network Monitor can be extended to additional locations using Remote Probes. 

Read more >>

Shadow IT is IT that is used outside of the official infrastructure of a company or without clearance from administrators. From private smartphones, USB sticks, to new cloud services: Shadow IT takes on many forms.

Read this e-book >>

How does virtualization work, and how does it affect network management? 

Get all the facts >>

Many hot trends in IT follow the trajectory of a firework on the Fourth of July: A loud bang, burst of light and it's over. Security is not one of those trends. Since the early days of networking, IT-security has been a critical issue, and that remains true now more than ever. In 2015, a survey conducted by Paessler revealed that 58% of all surveyed IT administrators named security as one of their key tasks and constant challenges.

Read more >> 

What are the reasons to move to the cloud? How do you handle the migration to the cloud? And how do you minimize stress and mitigate the risks of a migration? Find all these answers and more in our Clour Roadmap E-book. 

Get your free copy now >>

How fast is your Web server, really? Our Ping Speed Test will check your ping times from five different locations.

Read more >>

Our second SNMP White Paper focuses on the technical aspects - from the use of MIB files to the practical setup of network monitoring. We also take a look at some of the inadequacies of SNMP in modern networks.

Read more >>

We examine the risks facing IT and, in particular, network operations, and provide a three-step approach for creating an IT operational risk management strategy.

Read more >>

The recent digitization of healthcare IT has led to medical devices, medical data systems, and the traditional IT infrastructure becoming intertwined. Learn how to monitor the new integrated medical landscape.

Read more >> 

We provide you with 9 tips to avoid common network issues and ensure the daily health of your systems. 

Read more >>

Good communication is a must for any IT Administrator to keep things running smoothly. Download our communication pack and get email templates for common scenarios, as well as some general communication advice.

Get your PDF now >>