Latest News

Sponsored Post

It's Here! Monitor Microsoft Teams Audio Video Conferencing

Exoprise released its long awaited Teams Audio Video Conferencing sensor. This sensor fully tests Audio/Video end-to-end capacity, throughput, and network performance through the actual underlying Microsoft Teams and Azure infrastructure. The Teams AV sensor provides deep insight into a network's capability to handle the Teams/Skype Unified Communications (UC) platform. Desktop, Collaboration and Network administrators can now easily diagnose and proactively plan a Microsoft Teams rollout and migration.
Sponsored Post

11 security best practices for enterprises adopting a work-from-home model (Free e-book)

A majority of companies are moving towards a work-from-home model in an effort to reduce costs and improve operational agility. However, along with these advantages, a remote workforce brings up numerous security concerns. Download this e-book to learn how to secure your network and safely support a remote workforce.


Best practices for monitoring GCP audit logs

Google Cloud Platform (GCP) is a suite of cloud computing services for deploying, managing, and monitoring applications. A critical part of deploying reliable applications is securing your infrastructure. Google Cloud Audit Logs record the who, where, and when for activity within your environment, providing a breadcrumb trail that administrators can use to monitor access and detect potential threats across your resources (e.g., storage buckets, databases, service accounts, virtual machines).


DevOps automation: best practices and benefits

You probably know that automation is an important component of DevOps. But how do you actually put automation into practice in order to advance the goals of DevOps? Let's answer that question by exploring what automation means in the context of DevOps, why automation is important to DevOps and which processes to prioritize to achieve DevOps automation.


How To Determine When a Host Stops Sending Logs to Splunk...Expeditiously

So I've only been at Splunk for 8 months, and in the short amount of time I've been here, one of the most common questions I've been asked is “How do I get an alert when Splunk is not receiving logs?". As a matter of fact, if I had $0.05 each time I was asked this question, I would have $0.25! Surprisingly, with this being such an often-asked question, I haven't been able to find much documentation on how to accomplish this using the native features of Splunk.


3 Regulatory Compliance Trends That Are Accelerating in 2020

A growing attack surface and the exponential rise of data has opened the floodgates for breaches, leading to increased scrutiny by regulatory agencies. It’s not surprising that in recent years, regulators have had to double down with compliance mandates that are more stringent and punitive than ever before.


How OverOps Helps a Leading Telehealth Provider Support 10X Demand From COVID-19

The COVID-19 pandemic is accelerating digital transformation across the healthcare industry. OverOps helps telemedicine providers have confidence in their ability to quickly scale applications without compromising software quality. The COVID-19 pandemic has accelerated digital transformation for many industries, but perhaps none so much as the healthcare sector.


Hospital's IT Almost Wastes $900k on Hardware

After working in enterprise IT for over 20 years, I’ve come to the realization that most departments suffer from the same underlying contradiction. By nature, we IT professionals are a logic-seeking, detail-oriented bunch. Much of our work can take months, if not years, of meticulous planning and research. We find comfort in gazing upon complex, multi-colored scrum boards and searching for answers to problems that any sane person would avoid.


Through the crisis: Nexthink customer stories (AXA IM)

For a lot of Nexthink’s technical professionals, 2020 has been one of the most challenging and rewarding periods of their professional lives. Our customer base was impacted globally by COVID-19, and we were honored to be able to support them whenever and however we could, working closely to leverage their existing investment, as well as developing and distributing tailored services for those that needed them.


Access Control Lists with Kong

Access control is an important function in our daily lives. Access control is provided in many different realms. For example, a physical door, a software program, or an API. Access control simply means that you are controlling who/what can access something. We’re going to focus this discussion around access control for an API. Businesses benefit from providing APIs to their internal (and external) developers.