Operations | Monitoring | ITSM | DevOps | Cloud

Anomaly Detection

How AIOps turns anomaly detection into faster incident resolution

Quickly finding and resolving monitoring anomalies can make all the difference between service issues – and service excellence. But it’s far from easy, whether you’re trying to sift through countless alerts, understand the context behind anomalies, or swiftly pinpoint their root causes. If you’re an ITOps practitioner or enterprise architect looking to fine-tune your anomaly detection and resolution skills, you’ve come to the right place.
Sponsored Post

Revealing Suspicious VPN Activity with Anomaly Detection

Anybody who monitors logs of any kinds, knows that the extracting useful information from the gigabytes of data being collected remains one of the biggest challenges. One of the more important metrics to keep an eye on are all sorts of logons that occur in your network – especially if they originate on the Internet – such as VPN logins.

Webinar Recap: Building an AI Anomaly Detection Pipeline with InfluxDB

In this webinar hosted by InfluxDB and HiveMQ, we focus on how you can create value for your business using new tools in the AI and database ecosystem to quickly deploy AI models to perform tasks like anomaly detection. The webinar starts with a high-level overview of how MQTT and time series data can be valuable in an industrial IoT environment.

Anomaly Detection for Time Series Data: Techniques and Models

Welcome to the third chapter of the handbook on Anomaly Detection for Time Series Data! This series of blog posts aims to provide an in-depth look into the fundamentals of anomaly detection and root cause analysis. It will also address the challenges posed by the time-series characteristics of the data and demystify technical jargon by breaking it down into easily understandable language.

EventSentry v5.1: Anomaly Detection / Permission Inventory / Training Courses & More!

We’re extremely excited to announce the availability of the EventSentry v5.1, which will detect threats and suspicious behavior more effectively – while also providing users with additional reports and dashboards for CMMC and TISAX compliance. The usability of EventSentry was also improved across the board, making it easier to use, manage and maintain EventSentry on a day-by-day basis. We also released 60+ training videos to help you get started and take EventSentry to the next level.

Anomaly Detection for Time Series Data: Anomaly Types

Welcome to the second chapter of the handbook on Anomaly Detection for Time Series Data! This series of blog posts aims to provide an in-depth look into the fundamentals of anomaly detection and root cause analysis. It will also address the challenges posed by the time-series characteristics of the data and demystify technical jargon by breaking it down into easily understandable language. This blog post (Chapter 2) is focused on different types of anomalies.

Anomaly Detection for Time Series Data: An Introduction

Welcome to the handbook on Anomaly Detection for Time Series Data! This series of blog posts aims to provide an in-depth look into the fundamentals of anomaly detection and root cause analysis. It will also address the challenges posed by the time-series characteristics of the data and demystify technical jargon by breaking it down into easily understandable language. This blog post (Chapter 1) is focused on.

Anomaly Detection in 2024: Opportunities & Challenges

Anomaly detection is the practice of identifying data points and patterns that may deviate significantly from an established hypothesis. As a concept, anomaly detection has been around forever. Today, detecting anomalies today is a critical practice. That’s because anomalies can indicate important information, such as: Let’s talk a look at the wide world of anomaly detection.