Operations | Monitoring | ITSM | DevOps | Cloud

Our Selenium Synthetic Monitoring Stack

We maintain a highly optimised browser automation stack in order to provide the most stable environment for our customers to run their Selenium scripts in. Our goal is to deliver the best user experience for writing and maintaining a synthetic script and configuring the browser environments it runs in. The synthetic monitor data we produce is used for simulating website processes such as form-based authentication, eCommerce transactions, and regulatory checks.

Harnessing AIOps to Improve System Security

You’ve probably seen the term AIOps appear as the subject of an article or talk recently, and there’s a reason. AIOps is merging DevOps principles with Artificial Intelligence, Big Data, and Machine Learning. It provides visibility into performance and system data on a massive scale, automating IT operations through multi-layered platforms while delivering real-time analytics.

Cloverleaf and Customized Management Packs

Every business is different, and every IT environment has its own set of challenges. Customized SCOM Management Packs are created to meet the monitoring and automation requirements of your company's critical applications. OpsLogix offers a wide range of off-the-shelf monitoring products, but for companies working with niche applications, these are not always applicable.

Using automation and monitoring for documentation

I often have discussions with N-able partners who need help capturing data for either regular reporting or just to have when a customer asks for it. Often people will use a tool like BrightGauge to pull data from their RMM platform and generate dashboards and reports. However, these can be overly complex if you only need to capture the data so you have it and can act upon it. What I regularly recommend is that you create a monitoring script to capture just the data that is needed.

End-User Monitoring: How it Can Impact Your Business

After the global pandemic and lockdowns, most businesses look onward to online solutions for their applications. They want to take their business online by creating mobile or web applications. Companies are looking to monitor every aspect of the application, including deployment, bugs, API failures, etc. But the most important thing is how the application behaves when it goes into the hands of the end-users.

Is Your Zero-Trust Solution Missing Half Your Network?

With hybrid work environments on the rise, enterprise networks are dealing with multiple remote connections, increasing the risk of breaches and other attacks. One way to mitigate these risks is by implementing Zero Trust Architecture (ZTA) into the enterprise network. Unfortunately however this does not address the full set of threats to the enterprise, as many of the zero-trust service providers and on-premises network solutions do not address the voice network.