Operations | Monitoring | ITSM | DevOps | Cloud

Blog

What Are SSL Certificate Errors: Causes & Best Practices on How to Prevent and Fix Them

What do you think of a website that displays SSL/TLS certificate errors when you visit it? Most people abandon it in disappointment. A certain amount of trust and respect for the service is lost. After investing a lot of effort and time in getting users to visit your site, and the user finds the site down or showing a warning, it will result in having dissatisfied users. Moreover, if the downtime or warning is due to a security issue, it will also hurt your brand image.

Managing Sensu Go 6 using Ansible

Earlier this year, we shared the certified Ansible Collection for Sensu Go, which makes it easy to automate your monitoring and achieve real-time visibility into auto-scaling infrastructure. Now that Sensu Go 6 has been released, we’ll share the latest updates on the Collection, including the management aspects of Sensu Go 6, with a focus on the structure of Ansible playbooks in the Sensu Go 6 world.

Vital Web Performance

I hate slow websites. They are annoying to use and frustrating to work on. But what does it mean to be “slow”? It used to be waiting for document load. Then waiting for page ready. But with so many asynchronous patterns in use today, how do we even define what “slow” is? The W3C has been working on this with the new Event Timing and Element Timing API, and has defined some new Web Vital metrics to describe the different ways that slow performance can impact a webpage.

Ivanti Announces Strategic Acquisitions of MobileIron and Pulse Secure

In just 24 hours, tech bloggers and news sites everywhere have been sharing Ivanti's latest acquisition announcement. The news has been picked up by several publications including Redmond Magazine, MarketWatch, TechTarget, WSJ Pro Cybersecurity, and Channel Futures. And while we're delighted to be picked up by so many publications (seriously, we feel like the popular kid at school!), we're glad you've found yourself here on the Ivanti blog!

Wi-Fi and Application Health with Endpoint Monitoring

For today’s tech tip, we’re going to focus on our Endpoint Monitoring Client and two specific use cases: Wi-Fi and application health. With so much of the workforce working remotely, Endpoint Monitoring is an essential tool to help smooth the transition. According to recent research from Gartner, nearly half of US employees will continue to work remotely for at least some of the time post-pandemic.

Best Practices for Delivering a Business-Driven Security Posture

The main focus for cybersecurity teams — moving beyond compliance — is to deliver the level of security required to manage the likelihood of a breach and the potential impact to the business. This is more effective than simply focusing on the cost of delivering security services.

Incident Review - Microsoft Office 365 Outage

The whole internet spins across different domains but when we talk about the backbone suite of every organization, MS Office 365, is for sure, one of the biggest contenders. Just like the recent Century Link/Lumen outage, we witnessed another major outage, this time Microsoft O365. This month might as well be considered a bad month for the internet, as we have seen a lot of daily used consumer services getting impacted like Reddit, Pinterest, Google Services, etc.

10+ Best Log Analysis Tools & Log Analyzers of 2020 (Paid, Free & Open-source)

Log analytics, log analysis, and log management tools have become essential in troubleshooting. With logging analysis tools – also known as network log analysis tools – you can extract meaningful data from logs to pinpoint the root cause of any app or system error, and find trends and patterns to help guide your business decisions, investigations, and security.

AWS threat detection using CloudTrail and Sysdig Secure

Implementing AWS threat detection with Sysdig Secure takes just a few minutes. Discover how to improve the security of your cloud infrastructure using AWS CloudTrail and Sysdig Cloud Connector. With the rise of microservices and DevOps practices, a new level of dangerous actors threatens the cloud environment that governs all of your infrastructure. A malicious or inattentive cloud API request could have a sizable impact on availability, performance, and last but not least, billing.