Operations | Monitoring | ITSM | DevOps | Cloud

A Year of Learning & Growth at Martello

Perspective is important; 20/20 to someone who has just completed an eye exam is good news, however, the experience of 2020 that the rest of us have been privy to was much less clear. Martello has navigated through the challenges brought on by a global pandemic by taking proactive measures, being flexible, pivoting quickly when necessary, and continuing to work together – albeit as a socially distant team.

Why Grafana Labs delivers the best Prometheus in the Cloud

Over the last several months, there have been a variety of service providers that have launched Managed Prometheus offerings. This is a testament to the rise in popularity of the Prometheus project, and how it’s becoming a de facto standard for metrics. The most recent announcement in the Managed Prometheus landscape came from AWS. During a re:Invent keynote on Dec. 15, Amazon announced its AWS Managed Service for Prometheus.

A quick guide to the New Zealand Privacy Act 2020 for DBAs

December 1 saw the introduction in New Zealand of the Privacy Act 2020 which not only brings increased protection for individuals but also has some new implications for businesses, including increased fines for non-compliance and the reporting of serious privacy breaches.

Top 3 New Highlights of Ivanti Endpoint Security

With cybercriminal attacks becoming smarter and more difficult to prevent, traditional authentication methods using username and password have become less secure. This is mainly due to techniques such as account takeovers and brute force attacks. Multi-factor authentication is now considered to be one of the most effective ways to provide authentication security. Ivanti Endpoint Security 8.6 introduces multi-factor authentication for accessing the Console.

Containers vs Virtual Machines (VMs)

As microservices gain in popularity, containers have become a hot topic for developers. But how do they differ from virtual machines? Will containers replace virtual machines? And when should you choose containers over virtual machines? When it comes to defining virtual machines, the name says it all – machines (servers or desktops) that have been virtualized.

Sourcepoint - Scaling Business and Optimizing Customer Journey with Catchpoint

Sourcepoint, founded in 2015, works with both sellers and buyers of media and data, including marketers, heads of advertising operations, and privacy professionals. Sourcepoint provides solutions that ensure compliance with privacy regulations like GDPR and CCPA while helping its clients optimize revenue.

What Gartner Gets Right About Cloud Cost Optimization (and Where They Miss)

Earlier this year, Gartner published “How to Manage and Optimize Costs of Public Cloud IaaS and PaaS,” by analysts Marco Meinardi and Traverse Clayton. As a company that is focused on enabling engineering teams with cloud cost intelligence, we were of course curious what they had to say. Now, if you are familiar with Gartner, you know they have a reputation for serving enterprise clients, so they can sometimes be — well, enterprisey.

We achieved ISO/IEC 27001

We live in an uncertain world and monitoring should try to make sure that whatever happens we will always be informed. Therefore, security is the basis of everything in monitoring and for us it has always been one of the pillars of our strategy as a product. Security is not a technology, it is a way of thinking and acting, we could even say that it is an attitude. For years we have attended international fairs, events where computer security is offered as specific products.