Operations | Monitoring | ITSM | DevOps | Cloud

ITSM can Make Remote Working More Efficient Than You Thought: Here's How

As humans, it is common to find two tendencies when we work: Remote working began as a significant challenge. Many teams saw falling productivity and morale. Some people even declared it the end of ‘fixed working hours’ as we know it. As all of us started getting used to the concept, we started seeing solutions to alleviate, if not entirely eradicate the problems.

How to Overcome the Drawbacks of SIEM Tools

These days, “SIEM” (Security Information and Event Management) is all over the place. SIEM tools work by collecting data from multiple systems and noticing patterns in the data. This adds immediate value to the business by providing insights, security recommendations, and actionable intelligence. Despite being helpful tools for many companies, SIEM tools do have their drawbacks. This article will describe the four main ones and offer suggestions for how they might be overcome.

Glitch List: May 2020

Hello, and welcome back (to some of you, at least) from quarantine. Although things may look as though they’ve reached a new normal, our present equilibrium still includes a number of glitches. In May, in addition to the usual outages due to overloaded servers, we also have outages due to failures of partner monitoring, plus – an Anodot first – a pizza arbitrage issue. Is it true that you can make money by selling pizzas to yourself?

Common causes of a website's downtime. Why does a website go down?

May 31, 2020, WebGazer Team We are living in a highly competitive world. One where many businesses leverage on the internet to get ahead of their competitors. Having a beautifully constructed website with rich SEO content is one way to drive traffic to your site and business. But just having a website is not enough. As a matter of fact, a website could do more harm to your business than good.

Introducing cf-secret - Secret encryption in CFEngine

Contributor and CFEngine Champion, Jon Henrik Bjørnstad, developed a tool for encrypting files using CFEngine host keys, called cf-keycrypt. Thank you to Jon Henrik and all of our contributors for helping improve the CFEngine project. Our developer, Vratislav Podzimek, recently took some time to review the cf-keycrypt code, and made many improvements and fixes.

Best practices for monitoring GCP audit logs

Google Cloud Platform (GCP) is a suite of cloud computing services for deploying, managing, and monitoring applications. A critical part of deploying reliable applications is securing your infrastructure. Google Cloud Audit Logs record the who, where, and when for activity within your environment, providing a breadcrumb trail that administrators can use to monitor access and detect potential threats across your resources (e.g., storage buckets, databases, service accounts, virtual machines).

Sponsored Post

11 security best practices for enterprises adopting a work-from-home model (Free e-book)

A majority of companies are moving towards a work-from-home model in an effort to reduce costs and improve operational agility. However, along with these advantages, a remote workforce brings up numerous security concerns. Download this e-book to learn how to secure your network and safely support a remote workforce.

GrafanaCONline Day 10 recap: what's new in Grafana Cloud Graphite and Metrictank

Welcome to the third and final week of GrafanaCONline! We hope you’re able to check out our last day of online sessions today. If you didn’t get a chance to watch yesterday’s sessions (or want to watch them again), here’s what you missed on day 10 of the conference.

Cloud Infrastructure Means Shifted Responsibilities

The shift to cloud infrastructure does not remove the need for infrastructure management and administrators but rather necessitates a shift in their responsibilities. Cloud infrastructure has grown to be a ubiquitous part of the modern software industry. This is an amazing growth when you realize that Amazon did not announce Amazon Web Services, starting with Elastic Cloud Computing (EC2), until 2006.

How a Telecom Software Company Ensured Service Uptime with Network Monitoring

When you have millions of customers dependent on your connectivity & communication services performing with best possible efficiency, having network downtime because of any device failure is totally unacceptable. One of our customers is a proprietary global telecommunications vendor which designs, builds as well as manages data networks for telecoms all around the world.