Operations | Monitoring | ITSM | DevOps | Cloud

Latest Blogs

Science of Network Anomalies

Today’s networks have evolved a long way since their early days and have become rather complicated systems that comprise numerous different network devices, protocols, and applications. Consequently, it is practically impossible to have a complete overview of what is happening in the network or whether everything in the network works as it should. Eventually, network problems will arise.

Quick Solutions To Improve The Customer Experience

In today’s business environment, consumers and organizations have a different relationship altogether. Modern consumers have become more informed, and are not driven merely by quality or low prices. Gone are the days of product-oriented advertisements that focused just on the tangible benefits of a product or where premium quality was associated with better brands.

Rapidly Resolve Database Problems With Data Visualization

Organizations of all sizes invest in IT monitoring and analysis tools. But just because a computer knows what’s wrong doesn’t mean it can communicate those details effectively to IT teams. There is both art and science behind communication, which is why IT teams heavily rely upon data visualization. As organizations scale, so too does the importance of data visualization. Similarly, automating data analysis becomes increasingly useful with scale.

Avoid Market Pressures That Compromise Mobile App Security

The marketplace for mobile apps is a broad and highly competitive one. There are millions of apps available on Apple’s App store, Google Play, and within private enterprise app stores. Expanding market demands continue to drive the pressure to innovate. New iOS and Android updates and mobile device releases, along with myriad apps from companies vying for their customer’s attention, are creating shorter app release cycles.

Secure Monitoring - Open TCP Ports are a Security Risk

I’ve been updating some of our security documentation explaining what we do to ensure our product is suitable for the security models in regulated industries, such as finance and healthcare. Talking to our security guys, I was flabbergasted to find out that there are monitoring products out there that go against what is not only an industry best practice but also the right thing to do: agents that open and listen on fixed TCP ports!

Enhance NOC Alerts With Incident Management and Alert Automation

In a network operations center (NOC), alerts originating from hundreds of servers, application monitoring systems, emails and ticketing services compete to catch a NOC analyst’s attention. NOCs face many challenges in parsing through alerts to identify actionable notifications and mobilize the right response team into action.

Ten Reasons Foglight is the Right Database Monitor for Your Business

Digital transformation is creating many challenges for businesses including data platform diversity, IT skills gaps, cost control (especially cloud) and a more complex technical environment that can have performance issues with many possible causes. Speed, always-on, outstanding customer experience, and cost control are the business requirements driving digital transformations and resulting in performance and risk challenges facing database operations teams. What are those challenges?

Sponsored Post

Top Events You Should Always Audit & Monitor

Anybody who’s looked for answers on the Internet has likely stumbled across a “TOP X LISTS”: The “10 things famous people do every day”, “Top 10 stocks to by”, the “20 books you have to read” are just some examples of the myriad of lists that are out there offering answers. You may have even stumbled upon a few “Top 10 (or 12) Events To Monitor” articles too.