Operations | Monitoring | ITSM | DevOps | Cloud

Monitoring and security: an open marriage

Confidentiality, integrity and availability are the three basic laws of security. Availability is a kind of wayward son who becomes prodigal when he likes to, even if it is just to write eulogies with it when the systems go down, although the truth is that it is the most neglected out of the three of them and perhaps that is why monitoring has become more approached for what it may come from outside than what it is inside.

Combining supervised and unsupervised machine learning for DGA detection

It is with great excitement that we announce our first-ever supervised ML and security integration! Today, we are releasing a supervised ML solution package to detect domain generation algorithm (DGA) activity in your network data. In addition to a fully trained detection model, our release contains ingest pipeline configurations, anomaly detection jobs, and detection rules that will make your journey from setup to DGA detection smooth and easy.

IT Leaders in 2021: Great Expectations

During times of great uncertainty, leaders are always tested in ways they never imagined. Can they effectively surmount the external threats to the organization while keeping people committed and engaged with priorities? Back in March 2020, leaders were reacting — as swiftly as they could. Many were positive that the pandemic would disappear as quickly as it appeared and business and personal life would go back to normal.

Web performance: How to load test

Website owners commonly ask why they need a website performance load tester. Throughout web history, some extremely popular sites have had their fair share of serious downtimes. Either they get massive traffic volumes, or their website simply crashes. Thus, web performance load tester services check the application’s ability to perform under anticipated user loads.

Personas Are Not Just For Marketing

“The business does not exist for IT. IT exists for the business”, said David Paul, Director of IT at TRC, a Nexthink customer, during the recently wrapped up Experience Everywhere virtual conference. David seems to be stating the obvious. Indeed, this is something CIOs and IT leaders have always understood. But the lower into the IT rank and file you go, this sense of existential purpose often becomes forgotten in the daily hustle and bustle.

Why M365 monitoring adds value

Your employees rely on a wide variety of Microsoft 365 services such as sending emails, participate in Teams Meetings, exchanging files via SharePoint, and much more. Help your employees be their best by delivering cutting-edge Microsoft 365 services. Reveal hidden occasions for IT service improvement by advanced monitoring.

Unify APM and RUM data for full-stack visibility

Without unified visibility across your entire stack, it can be difficult to investigate backend dependencies when troubleshooting frontend issues, or to track the source of database failures that originate from bad browser requests. Full-stack visibility gives you the insight you need to pinpoint and resolve incidents quickly.

Tell data-driven stories with Collaborative Notebooks

Whether you’re deciding on follow-up items for a postmortem, submitting a request-for-comments for review, or creating an executive report, making sense of all the available data and collaborating with others to tell a clear, data-driven story can be difficult. When there are multiple stakeholders and teams working together, it can be hard to manage the back-and-forth process of feedback and revision to ensure you have up-to-date information.