Operations | Monitoring | ITSM | DevOps | Cloud

Cloud Optimization: How to Squeeze More Value From Your Spend

Minimizing costs, reducing risk, and maximizing business value—all at the same time—requires a delicate balancing act. It’s not a new challenge, nor is it unique to IT infrastructures. But when it comes to the cloud, especially in hybrid cloud scenarios, it requires you to understand the performance, risk/compliance, and cost impacts of your current resource allocations and then adjust to maintain the optimal decisions to meet your SLA and budget targets.

Deploying AWS Microservices

There has been increasing buzz in the past decade about the benefits of using a microservice architecture. Let’s explore what microservices are and are not, as well as contrast them with traditional monolithic applications. We’ll discuss the benefits of using a microservices-based architecture and the effort and planning that are required to transition from a monolithic architecture to a microservices architecture.

Mitigating BootHole - 'There's a hole in the boot' - CVE-2020-10713 and related vulnerabilities

Today we released updates for a series of vulnerabilities termed ‘There’s a hole in the boot’ / BootHole in GRUB2 (GRand Unified Bootloader version 2) that could allow an attacker to subvert UEFI Secure Boot. The original vulnerability, CVE-2020-10713, which is a high priority vulnerability was alerted to Canonical in April 2020.

Remote Access Methods: Monitoring Work from Home and File Access

Working remotely has grown over the past several months for many organizations. The ability to provide remote access involves being able to control access to network and cloud-based servers while allowing employees to access the data and files they require to do their jobs. Remote access is also needed to monitor what data and files employees are accessing. Working remotely allows a business to continue to operate when employees are not able to work in the office.

We're evolving our go-to-market functions to build the future with you

ServiceNow isn’t your typical enterprise software company. Our belief that technology exists in service of people and our founding focus on customer success are just a couple of the things that set us apart. When we make your work lives, work better, we all win.

A Unified Security Operations Platform: Splunk Mission Control

Security is easy, right? Get yourself a patchwork of security point products meant to solve one or two specific problems, and your organization is safe from threats! Ah, if only it were that simple… In reality, security operations are disjointed and complex. Security visibility and functionality (i.e. threat detection, investigation, containment and response capabilities) are often divided among a multitude of different security products (e.g.

7 things no one will ever tell you about Kubernetes

Kubernetes is the most popular Open Source technology of the last five years. It was created by Google to allow companies to use container (Docker) applications in production. Today, Kubernetes is the new standard for running applications in the Cloud or on its servers (on-premise). I even heard from a Cloud architect from Azure: "our customers no longer come to us to do Cloud, but to do Kubernetes". That's to say how much a utility software* upsets a whole ecosystem.

First look at the Azure SQL Managed Instance MP

The Azure SQL Managed Instance is one of Microsoft’s Platform-as-a-Service (PaaS) offerings for SQL. It adds all the features you would expect of a PaaS platform such as automated patching, backups and streamlined high availability whilst closely aligning the technology to on-premises or IaaS workloads to reduce the barrier to entry. The product features near 100% compatibility with the latest Enterprise Edition of SQL Server and the automated Azure Data Migration service.

How to Gain Observability with Custom Checks and External Monitoring

Slack recently had a no good very bad day in which some broken external monitoring contributed to a perfect storm. But one passage caught our eye: “After the incident was mitigated, the first question we asked ourselves was why our monitoring didn’t catch this problem. We had alerting in place for this precise situation, but unfortunately, it wasn’t working as intended.

Protecting Your Apps From Link-based Vulnerabilities: Reverse Tabnabbing, Broken-Link Hijacking, and Open Redirects

Links are so fundamental to web development that they're almost invisible. When we link to a third-party page, we hardly ever consider how it could become an opportunity to exploit our users. In this article, Julien Cretel introduces us to three techniques that bad actors can use to target our users and discusses how to avoid them.