Operations | Monitoring | ITSM | DevOps | Cloud

Sponsored Post

EventSentry v4.0 - Introducing ADMonitor

Since Active Directory is the foundation of all Windows networks, monitoring Active Directory needs to be part of any comprehensive security strategy. Up to version 3.5, EventSentry utilized Windows auditing and the security event log to provide reports on: User Account Changes, Group Changes and Computer Account Changes.

An Introduction to Big Data Concepts

Gigantic amounts of data are being generated at high speeds by a variety of sources such as mobile devices, social media, machine logs, and multiple sensors surrounding us. All around the world, we produce vast amount of data and the volume of generated data is growing exponentially at a unprecedented rate. The pace of data generation is even being accelerated by the growth of new technologies and paradigms such as Internet of Things (IoT).

Everything You Need to Know About the OSS Licensing War, Part 2.

Where we left off: AWS had taken the Elasticsearch software and launched their own cloud offering in 2015, and Elastic N.V. had doubled down on an “open core strategy.” Once AWS decides to offer a project like Elasticsearch, it immediately becomes a truly formidable competitor to anyone trying to do the same, even the company behind the software itself. AWS has huge scale, operational expertise, and various network effects that really compound.

Zero Trust Security: Supporting a CARTA approach with Continuous Monitoring

Learn how to support a continuous adaptive risk and trust assessment (CARTA) approach leveraging accurate Kubernetes flow logs. 5-tuple logging is commonly used to monitor and detect anomalies and produces unreliable data that cannot accurately identify anomalies nor prove enforcement of security policies.

Zero Trust Security: Supporting a CARTA approach with Anomaly Detection

Learn how Anomaly Detection supports, what Gartner has termed, a continuous adaptive risk and trust assessment (CARTA) when building a CaaS platform using Kubernetes. Anomaly Detection expands the zero trust network security model and continuously assess the application and network risk that enables adaptive policy adjustments.

Crime and Anomalies in the Windy City

When is it safest to visit Chicago parks? To walk the city’s streets? To be a kid? Here are three incredible anomalies I turned up in Chicago law enforcement data. I love Chicago. I’ve lived in Illinois for five years, and have come to love my visits to the city – the parks, the lake, the architecture, the music, the food, the universities, the people. It’s a city that’s truly unique in the world.

Advancing Autotask With Incident Alert Management Platforms

For MSPs, Datto’s Autotask PSA provides a powerful system, offering ticketing and project management capabilities. Though Autotask is an essential solution tool for MSPs and their teams, it becomes even better with an incident alert management platform integration. Now, if you’re curious to know how Autotask’s integration with incident alert management platforms work, you’re in luck!

How To Foster Positive Employee Experiences To Drive Long-Term Digital Transformations

The term “digital transformation” has emerged as a veritable buzzword over the past few years, with more and more companies leveraging new technologies to fundamentally shift how they do business and how their employees accomplish daily tasks. According to the International Data Corporation (IDC), by 2022, enterprises will spend almost $2 trillion annually on digital transformation agendas.