Operations | Monitoring | ITSM | DevOps | Cloud

Blog

Script Writing: A Crash Course on User Journey Selectors

User Journeys are a powerful tool for ensuring key processes across your site are working correctly. They follow a scripted set of instructions to interact with your pages like a human visitor does – and to identify issues as they come up. We offer a “Managed Service” for looking after your User Journey scripts, or you might prefer to use our script builder to write your own.

SRE as Organizational Transformation: Lessons from Activist Organizers

In the software industry’s recent past, the biggest disruptive wave was Agile methodologies. While Site Reliability Engineering is still early in its adoption, those of us who experienced the disruptive transformation of Agile see the writing on the wall: SRE will impact everyone. Any kind of major transformation like this requires a change in culture, which is a catch-all term for changing people’s principles and behaviors.

Challenges of growth engineering in a DevOps company

Growth engineering is a practice in which product, engineering, and design support a company’s growth efforts from within the product itself. Growth engineering has gained traction in consumer-facing companies. This practice has gained plenty of traction in the SaaS world over the last decade, to help support growth of self-serve users who often purchase services without the involvement of traditional sales teams.

ManageEngine makes the cut again for unified endpoint management

There’s no doubt in my mind that Gartner Midmarket Context: Magic Quadrant report is the most important of all Magic Quadrants up to this point. With COVID-19 forcing a large amount of the workforce worldwide to move from their offices to work-from-home environments, unified endpoint management and security has been essential in enabling businesses to continue to operate securely. At ManageEngine, we are constantly evolving our solutions to meet these dynamic market needs.

Monitor Juniper network devices with Datadog

Juniper Networks provides a range of IT network and security devices, including routers, switches, access points, and firewalls. As you scale your on-prem infrastructure with potentially thousands of devices distributed across multiple locations, getting visibility into your entire network can easily become a pain point.

How to View Office 365 Service Health in CloudReady?

In today’s modern IT world, enterprises are looking to not only streamline their global monitoring operations but also facilitate access to reporting capabilities that provide insight into usage, uptime, and availability of SaaS services. Covid disrupted the work culture and our daily lives. With so many of us working from home, IT leaders and executives are now more than ever interested in ensuring that the cloud services their team relies on are available.

How to Make Your Zoom Meetings More Secure

During the first months of the last year, Zoom was a little known video conferencing platform with a few million users. However, the spread of Coronavirus across the globe forced businesses and organizations to make changes in their working models. Among them was adopting remote working practices, fostered by several communication and collaboration tools. This is where Zoom's popularity surged, with remote workers using the tool to conduct virtual meetings. However, the explosive popularity of Zoom created several cybersecurity ramifications. The unexpected growth exposed the platform to various security faults, vulnerabilities, and hackers. That said, below are some of the best practices to keep your Zoom meetings secure.

Accelerate your logs investigations with Watchdog Insights

If you’re investigating an incident, every minute means degraded performance or even downtime for customers. The causes of an issue often come from parts of your systems and applications that you would not think to check, and the sooner you can bring these to light, the better.

Ivanti Insights Episode 3: In the World of Privacy, Nothing is Free - Including Social Media Apps

Did you know there are currently 4.20B social media users globally? That’s 53% of the total global population! From the most popular social media platforms like Facebook and YouTube, to the hottest up and coming platforms like TikTok and Clubhouse, there is one thing they all have in common: privacy regulations and considerations should be and need to be top priority. Ivanti’s Sr.

5 Steps to Configure Cisco AnyConnect VPN

Because the world continues to work from home this year, I’ve had to configure Cisco AnyConnect VPNs on ASA firewalls for clients a few times. Unfortunately, the documentation from Cisco is extremely confusing, and I’ve seen a lot of organizations that do it wrong (by which I mean insecurely). The process itself is quite simple, though, so let’s go through the steps you’ll need to configure Cisco AnyConnect for your VPN.