Operations | Monitoring | ITSM | DevOps | Cloud

Automate Secure Access Management With Rollbar + Okta

At Rollbar, we know security matters. Our customers represent the leading technology companies in the world today, and keeping their data secure is our top priority. Look no further than our investment in security and compliance. Rollbar is fully compliant with stringent industry standards like GDPR and HIPAA. We have also received ISO27001, SOC 2 Type 1, and Type 2 compliance certifications to ensure that even the most security-conscious companies can use our SaaS platform.

How Should an MSP Evaluate a PSA Solution?

Managed services providers (MSPs) juggle a lot of responsibilities. They have to address rapidly changing customer demands while still providing high-quality service, managing increasingly complex environments, evolving their service offerings, and much moreyou’re your business scales, it’s hard to accomplish these goals without the help of professional services automation (PSA) software.

Automate EKS Node Rotation for AMI Releases

In the daily life of a Site Reliability Engineer, the main goal is to reduce all the work we call toil. But what is toil? Toil is the kind of work tied to running a production service that tends to be manual, repetitive, automatable, tactical, devoid of enduring value, and scales linearly as a service grows. This blog post describes our journey to automate our nodes rotation process when we have a new AMI release and the open source tools we built on this.

Fighting Ransomware: Using Ivanti's Platform to Build a Resilient Zero Trust Security Defense

Ransomware is a strain of malware that blocks users (or a company) from accessing their personal data or apps on infected iOS, iPadOS, and Android mobile devices, macOS laptops, Windows personal computers and servers, and Linux servers. Then the exploit demands cryptocurrency as payment to unblock the locked or encrypted data and apps. This form of cyber extortion has been increasing in frequency and ferocity over the past several years.

Citrix Issues and Problems

A few days ago, we hosted a very well received webinar presented by Barry Schiffer (CTP) from eG’s Benelux team and George Spiers, CTP and real-world Citrix Administrator. They covered key questions and workflows, such as: A colleague and I were answering questions during the live webinar, and we received a lot of questions. One of the best things about participating in these webinars is the high quality and breadth of questions that we receive from the attendees.

Our plan for world domination: take down the internet

We have been warning for a long time: Pandora FMS will control the world. We have given time to world governments to prepare, to North American villagers to prepare their bunker, for sects to draw their banners with “THE END IS NEAR”. And it is, it is indeed. Today, in our blog we reveal the secret plans of this company to overthrow the institutions and rule the world, then you will say that we did not warn you.

Limitless XDR defined: Ingest, retain, and analyze security data freely

Elastic Security's newest features define the potential of XDR for cybersecurity teams. Our single platform brings together SIEM and endpoint security, allowing users to ingest and retain large volumes of data from diverse sources, store and search data for longer, and augment threat hunting with detections and machine learning. Security vendors are using the term “XDR” with increasing frequency, applying varied definitions to suit their respective technologies.