Operations | Monitoring | ITSM | DevOps | Cloud

Optimised authentication methods for Ubuntu Desktop

Still counting on passwords to protect your workstation? When set up properly, alternatives to passwords provide a streamlined user experience while significantly improving security. These alternative authentication methods can also easily be combined to create a custom and adaptive authentication profile.

Configuration Management - bringing infrastructure chaos under control

For IT teams it has never been an easy task to build and maintain an inventory of all the systems, software and hardware that organizations are reliant on to deliver their services and do something meaningful for the business with this information. As organizations grow they accumulate more and more asset and config data. Information inevitably ends up scattered across multiple, disconnected repositories; ITSM tools, service catalogs, software asset management systems, databases, spreadsheets etc.

Here's the Top Tool Your IT Department Didn't Know They Needed

COVID-19 has impacted every single aspect of our lives as we knew them. Almost overnight, businesses had to create an entirely new working environment, parents had to become teachers and essential workers become the real heroes. As time goes on, more and more businesses are transitioning to 100% remote workforces.

ServiceNow named a Leader in the IT Risk Management Magic Quadrant

It’s an honor to be recognized as a Leader in the Gartner 2020 Magic Quadrant for IT Risk Management (ITRM)! The comments from our customers are an extra tribute. According to the report: Per our understanding, the fact that we could exceed our customers’ expectations with our integrated risk portfolio and the Now Platform means we met our goal–now we must aim higher.

A Day in the Life: Secrets of a Top Splunk Security Analyst

At Splunk, we’re proud to employ some of the top security analysts in the industry. On any given day, they’re investigating security incidents, triaging alerts and identifying threats so our systems and data — as well as those of our customers — remain secure. But what, exactly, do Splunk security analysts do? And what are some of their biggest challenges?

ManageEngine launches M365 Security Plus, an exclusive security solution for Microsoft 365

Data is the cornerstone of most businesses. Companies handle a substantial amount of data every day, and just one data breach can result in compliance violations, lawsuits, and more, costing the company thousands of dollars. Here at ManageEngine, we believe that part of what makes a business successful is having an efficient security solution. Taking that one step further, we have designed the perfect security solution for Microsoft 365: M365 Security Plus.

ITOM podcast episode 1 is out! Learn the basics of VPNs to enable your remote workforce

The wait is finally over. The first episode of our weekly podcast series aimed to alleviate all your remote work hassles is out. The efficacy of remote operations depends on a robust virtual private network (VPN). VPNs help facilitate remote work by acting as a conduit between an organization’s remote workers and its private network. VPNs ensure a safe passage for the transmission of business-critical data and grants end users access to on-premises services to maintain operational continuity.

Loki 1.6.0 released: Metric query performance up to 10x faster, push logs from any client to Promtail, query language and LogCLI enhancements, and more!

Things have been busy with the Loki project! Once again, we waited too long between releases, and there are so many new things I won’t be able to list them all. But that won’t stop me from trying, so let’s get to it. For a change of pace, instead of listing interesting PRs, I’m going to talk through Loki’s components and mention the changes in more of a paragraph style. Let’s see how this goes.

Static Thresholds vs. Dynamic Thresholds

IT monitoring is a complex field with several approaches to manage monitoring and alerts. Most of the current monitoring solutions provide Static Threshold-Based alerting, where IT Operations staff are notified when resource utilization breaches the defined threshold. The problem with Static Thresholds is that these are manually adjusted, and tuning it to meet the specific environment and needs of an organization is a major challenge for IT Operations teams.