Operations | Monitoring | ITSM | DevOps | Cloud

Kentik

Breaking the Cloud Illusion: The Hard Truth about Successful Migrations

Join our Kentik experts and Andrew Green, Research Analyst at GigaOm for a panel discussion on common challenges organizations face as they move their workloads to the cloud. They will discuss some tales from the field and ways organizations can mitigate some of these challenges, such as cost overruns, connectivity interruptions, and security considerations.

Dual Subsea Cable Cuts Disrupt African Internet

On Sunday, August 6, an undersea landslide in one of the world’s longest submarine canyons knocked out two of the most important submarine cables serving the African internet. The loss of these cables knocked out international internet bandwidth along the west coast of Africa. In this blog post, we review some history of the impact of undersea landslides on submarine cables and use some of Kentik’s unique data sets to explore the impacts of these cable breaks.

How to Perform a Forensic Analysis After a Security Breach

In this Kentik demo, Phil Gervasi shows how to perform a forensic analysis after a security breach. Leveraging Kentik's robust visibility into public cloud traffic, we showcase how engineers can effectively identify, analyze, and respond to security incidents. Through a hypothetical scenario, we trace a security alert from its origin—a suspected attack on an Azure-hosted system—to its resolution. Using tools like the Kentik Map and Data Explorer, we identify the attacker's entry point, compromised internal devices, and potential data exfiltration activities.