gsx

3 Reasons Why Your Office 365 User Performance Monitoring Strategy is All Wrong

Like every server, service, and application your organization leverages, you need to be monitoring it to ensure availability, efficiency, security, and user productivity. But any application born in the cloud is a bit more difficult to monitor, as the cloud always reduces visibility to some degree. Office 365 is no exception. For most organizations, monitoring Office 365 is likely little more than just knowing whether the related services are up and running.

manageengine

The value UEM delivers in digital upgradation of enterprises' IT administration

2020 has arrived. Most companies are striving to become digitally transformed, business applications are moving to the cloud, and day-to-day IT operations are becoming more mobile-oriented with executives using a diversified range of devices. Employees don’t just use company-provided desktops; they often work on the go with corporate-owned, personally enabled (COPE) laptops, mobile devices, and iPads; bring your own device (BYOD); etc.

rapidspike

Capture the Page Source of Website Errors

When it comes to website errors and issues, seeing is believing. Like most developers, I’ve been guilty of using the line “it works on my machine” when confronted with an annoying bug that only shows up under some obscure conditions. But just because one person doesn’t see it, doesn’t mean tens or hundreds of customers aren’t experiencing it.

yellowfin

How to create a data culture through data storytelling

One of the core reasons that organizations invest in analytic solutions is because they want to get everyone in their organization on the same page. They want everyone to understand what's happening and why it's happening so that individuals know what they need to do to be successful and drive outcomes for the organization.

tripwire

How CISOs Can Expand Their Security Duties into Industrial Environments

Digital attacks are a top concern for Industrial Control System (ICS) security professionals. In a survey conducted by Dimensional Research, 88 percent of these personnel told Tripwire that they were concerned about the threat of a digital attack. An even greater percentage (93 percent) attributed their concerns to the possibility of an attack producing a shutdown or downtime.

victorops

When You Shouldn't Use Infrastructure Automation

Automation, automation, automation. If Steve Ballmer were doing his developers dance today, instead of in 2001, those are probably the words he would have been shouting. After all, we’re told that automation is the key to building agile, cloud-native, highly-available, high-performing systems (to name just a handful of buzzwords that go hand-in-hand with automation today).

honeycomb

Using Honeycomb to remember to delete a feature flag

Feature flags are great and serve us in so many ways. However, we do not love long-lived feature flags. They lead to more complicated code, and when we inevitably default them to be true for all our users, they lead to unused sections of code. In other words, tech debt. How do we stay on top of this? Find out how Honeycomb’s trigger alerts proactively tell you to go ahead and clean up that feature flag tech debt!

siemplify

Why Playbook Lifecycle Management is the New Feature Your SOAR Technology Needs

As security operations centers (SOCs) broaden their implementation of security orchestration, automation and response (SOAR) technology to automate some, or all, of the triage, investigation and response their team must undertake, a new challenge is emerging. SOCs are finding their playbooks that interact with the many technologies in their environments are failing to complete successfully, resulting in analysts having to intervene manually to complete investigations.