Operations | Monitoring | ITSM | DevOps | Cloud

Ceph storage on VMware

If you were thinking that nothing will change in your VMware data centre in the following years, think again. Data centre storage is experiencing a paradigm shift. Software-defined storage solutions, such as Ceph, bring flexibility and reduce operational costs. As a result, Ceph storage on VMware has the potential to revolutionise VMware clusters where SAN (Storage Area Network) was the incumbent for many years.

How to implement an automated health check alert for Enterprise Alert database

Enterprise Alert is the central hub for managing critical alerting, notifications, and remediation needs. It is a database-driven application and most of the time, once set up and configured, it just silently does its job in the background.

Improved 2-way integration with BMC product family

With our latest release 8.4.4, we included a number of changes to our 2-way smart connectors for the BMC product family to improve running scenarios as well as to ease the way for more integration to benefit from the reliable notifications and remote remediation capabilities Enterprise Alert offers.

DNS Blacklist Monitoring: Protect Your Company's Reputation

Did you know that around 306 billion emails have been sent globally every day in 2020 and about 45 percent of all emails received are spam. Even more surprisingly, websites that are marked as spam on email portals lose 95 percent of their traffic. Email servers tend to blacklist certain IDs as spam based on their content. And for companies marketing their business via emails, 36 percent of the total spam messages across the globe are attributed to advertising content.

The Importance of Monitoring SSL Certificates

Secure Sockets Layer, or SSL, is a global security standard technology that is being adopted by a number of different organizations across the globe. Essentially, SSLs are small data files containing a cryptographic key. This key carries important information about the organization using it. Around 600,000 websites have installed SSL certificates for security.

VPN vs. Remote Desktop - Gateway Security Concerns

VPNs and Remote Desktop Gateways are two different tools used to achieve similar goals. That is: access content or software remotely and securely, and improve the overall freedom of the user – whether that’s from prying eyes or the need to have physical access to their business network. But while each option can be attractive, neither is without its security concerns.

3 ways secrets management improves monitoring & observability

Monitoring — by its very nature — requires privileged access to internal and external services. In order to safely maintain visibility into critical systems, it’s vital to have some form of secrets management to manage authentication credentials (AKA, "secrets"), including passwords, keys, APIs, tokens, and any other sensitive pieces of information in your IT infrastructure.

Cut down the time to improve with ITSM Continual Improvement Management

We measure a lot of our ITSM success through increments of time. But mean time to resolution, time on page in the knowledgebase, and cases-per-hour aren’t just go-to metrics. They set the cultural expectations for our service teams – that improving service times, without sacrificing quality, is paramount.

Your ITSM should have purpose-built workspaces

Look around your desk, and you probably see a variety of tools that make you more productive — an ergonomic chair, a mug of coffee or tea, a notepad, or a charger. As individuals, we put great thought into making our personal space productive, a habit that many organizations have yet to fully replicate in their digital workspaces.