Operations | Monitoring | ITSM | DevOps | Cloud

SLA Management

In this tutorial, we will show you how to use the Dotcom-Monitor platform to to track a service provider's adherence to SLA requirements. The SLA Report is a special reporting group where you can review and track adherence to SLA requirements, through a single reporting interface, from monitoring locations throughout the world. Learn more about SLA Reporting and other reports and dashboards that are available through Dotcom-Monitor.

Webinar: Achieve comprehensive observability with Sensu and Elasticsearch

The Elasticsearch data platform is ideal for analyzing monitoring and observability data. But if your multi-cloud journey has led you to multiple monitoring and observability tools, you may face challenges getting all that data into Elasticsearch. In this webinar, Sensu Developer Advocate Todd Campbell shows you how to get the most out of your Elasticsearch investment — and achieve deeper visibility — with the Sensu observability pipeline.

Onboarding Best Practices: JFrog Pipelines

JFrog Pipelines empowers software teams to ship updates faster by automating DevOps processes in a continuously streamlined and secure way across all their teams and tools. Encompassing continuous integration (CI), continuous delivery (CD), infrastructure and more, it automates everything from code to production. Pipelines is natively integrated with the JFrog Platform and is available with both cloud (software-as-a-service) and on-prem subscriptions.

Shift-left And Scale Security With The Power Of JFrog And Google

What does it mean to “shift left”? How can you scale security effectively as you do? These are growing questions corporations and developers are facing in a distributed, global economy. In this webinar you will learn how the amazing combination of GCP and JFrog allows dynamic workflows and automated quarantine processes, continuous scanning of production artifacts, integration with the broader business, and how you can scale all of these solutions rapidly in your fast-paced environment.

Detecting DGA Activity in Network Data with Elastic ML - Oct 1, 2020 Elastic Stockholm Meetup

After infecting a target machine, many malicious programs need to communicate with a command & control server ( C & C) that is controlled by the malware author. In order to avoid detection and subvert defensive measures, malware authors employ domain generation algorithms (DGA), which enable the malware to generate hundreds or thousands of new domains, one of which is then registered by the malware author as the location of the C&C server.