Operations | Monitoring | ITSM | DevOps | Cloud

Industry Analysts Recognizing Cloud Analytics Brings Wave of Disruption to the SIEM Market

In the new report, “Analytics is making its security operations mark ahead of schedule,” analyst firm 451 Research details the accelerating transition happening in the security information and event management (SIEM) space. The report underscores how new cloud-native analytics solutions are displacing traditional SIEMs at the heart of the defense.

Running Lambdas on your Laptop

Serverless has the potential to bring massive ops advantages to projects of all sizes, but while it presents great business benefits, we need to spare a thought for how teams develop on serverless. I recently published ‘Serverless Development is Broken’ a list of concerns about how developers can work with long deploy times inherent in a cloud-only code environment.

S3 Security: How to Easily Secure and Audit AWS S3 Buckets?

Amazon S3 is an object storage service widely used for storing many different types of data in the cloud. While it’s inexpensive and easy to set up and maintain S3 buckets, it’s also very easy to overlook S3 security aspects and expose them to malicious attacks. A typical example is accidentally allowing public access to S3 files. Several recent high-profile data breaches were caused by lax S3 security.

Kubernetes as a Service: GKE vs. AKS vs. EKS

Kubernetes (K8s) is a prevalent open-source system for automating the deployment, scaling, and management of containerized applications. However, maintaining the service can be difficult and expensive. For that reason, it is easy to find platforms offering Kubernetes as a managed service. In this article, we will analyze three of the most popular services currently available: Google Kubernetes Engine, Azure Kubernetes Service, and Amazon Elastic Container Service for Kubernetes.

Kubernetes Master Class: How to Secure Production Kubernetes and Service Mesh Workloads on Rancher

As more container deployments move into production there will be an increasing level of attacks on application containers and the orchestration tools to manage them. The success of Kubernetes has been a major enabler for the “service mesh” concept to become a reality, as a “sidecar” container is the ideal form-factor for service mesh functions to be placed together with the service itself. The important thing to remember is that, although a service mesh has security features, it is NOT a security solution. It is not designed to provide the type of network, endpoint and host security required for defense in depth.

ManageEngine recognized as a May 2019 Gartner Peer Insights Customers' Choice for Network Performance Monitoring and Diagnostics Software

2019 continues to be a great year for ManageEngine accolades. This time, we are proud to announce that we’ve been named a May 2019 Gartner Peer Insights Customers’ Choice for Network Performance Monitoring and Diagnostics Software. The consistent performance of our network performance monitoring (NPM) solutions—OpManager, NetFlow Analyzer, and Network Configuration Manager—has been the driving force behind this recognition.

Better Together: DX AIOps and Intelligent Automation

Organizations are rapidly adopting AI first strategies to power digital business models. Hear Broadcom executives Kieran Taylor and Ralf Paschen share our approach for AI-driven automation for the digital business. In this video, you'll learn why having intelligent automation aligned to AIOps enables the promises of delivering AI-driven digital experiences.