
The Ipswitch WhatsUp Gold suite of network, application and server monitoring software has been certified under the Common Criteria Evaluation and Validation Scheme (CCEVS).
Common Criteria is an internationally recognized standard allowing public and private sector organizations to confidently assess the security and assurance of IT software.
As a result of the certification, Ipswitch WhatsUp Gold software meets mandates for US Federal government agencies running applications in National Security Systems (NSS) environments.
“With Common Criteria certification in place, our customers have the added confidence that our WhatsUp Gold products have been validated against rigorous security standards covering user data protection, fault tolerance, authentication and more,” said Lourdes Engel, SVP of Research & Development at Ipswitch. “Ipswitch remains committed to adhering to and advancing security best practices for our broad portfolio of software solutions.”
WhatsUp Gold software products that now meet Common Criteria standards include:
- WhatsUp Gold Premium that monitors networks, applications and servers
- WhatsUp Application Performance Monitor that assesses the impact of complex application performance problems wherever they originate
- WhatsUp Gold Flow Monitor that analyzes and manages network traffic and bandwidth utilization
- WhatsConfigured that manages network configurations and changes
- WhatsVirtual that monitors virtual servers
Common Criteria was adopted by the International Standards Organization and embodied in a Common Criteria Mutual Recognition Arrangement that covers more than two dozen countries worldwide. The arrangement leverages the use of Common Criteria certificates by each member nation so that products can be procured without the need for further evaluation.
The Latest
Overall outage frequency and the general level of reported severity continue to decline, according to the Outage Analysis 2025 from Uptime Institute. However, cyber security incidents are on the rise and often have severe, lasting impacts ...
In March, New Relic published the State of Observability for Media and Entertainment Report to share insights, data, and analysis into the adoption and business value of observability across the media and entertainment industry. Here are six key takeaways from the report ...
Regardless of their scale, business decisions often take time, effort, and a lot of back-and-forth discussion to reach any sort of actionable conclusion ... Any means of streamlining this process and getting from complex problems to optimal solutions more efficiently and reliably is key. How can organizations optimize their decision-making to save time and reduce excess effort from those involved? ...
As enterprises accelerate their cloud adoption strategies, CIOs are routinely exceeding their cloud budgets — a concern that's about to face additional pressure from an unexpected direction: uncertainty over semiconductor tariffs. The CIO Cloud Trends Survey & Report from Azul reveals the extent continued cloud investment despite cost overruns, and how organizations are attempting to bring spending under control ...

According to Auvik's 2025 IT Trends Report, 60% of IT professionals feel at least moderately burned out on the job, with 43% stating that their workload is contributing to work stress. At the same time, many IT professionals are naming AI and machine learning as key areas they'd most like to upskill ...
Businesses that face downtime or outages risk financial and reputational damage, as well as reducing partner, shareholder, and customer trust. One of the major challenges that enterprises face is implementing a robust business continuity plan. What's the solution? The answer may lie in disaster recovery tactics such as truly immutable storage and regular disaster recovery testing ...
IT spending is expected to jump nearly 10% in 2025, and organizations are now facing pressure to manage costs without slowing down critical functions like observability. To meet the challenge, leaders are turning to smarter, more cost effective business strategies. Enter stage right: OpenTelemetry, the missing piece of the puzzle that is no longer just an option but rather a strategic advantage ...
Amidst the threat of cyberhacks and data breaches, companies install several security measures to keep their business safely afloat. These measures aim to protect businesses, employees, and crucial data. Yet, employees perceive them as burdensome. Frustrated with complex logins, slow access, and constant security checks, workers decide to completely bypass all security set-ups ...

In MEAN TIME TO INSIGHT Episode 13, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at EMA discusses hybrid multi-cloud networking strategy ...
In high-traffic environments, the sheer volume and unpredictable nature of network incidents can quickly overwhelm even the most skilled teams, hindering their ability to react swiftly and effectively, potentially impacting service availability and overall business performance. This is where closed-loop remediation comes into the picture: an IT management concept designed to address the escalating complexity of modern networks ...