Operations | Monitoring | ITSM | DevOps | Cloud

Is your business PCI DSS compliant?

How Chooseus Life Insurance lost its customers’ cardholder details and their trust In August 2019, reporters began flocking to Chooseus Life Insurance’s head office in Detroit after news leaked that thousands of the company’s customers had lost money due to a security breach. The CEO of this life insurance company released the following statement: “We have had your trust for two years.

Resource Management, Images, and more with ServiceDesk Plus 11.1

The user education team at ServiceDesk Plus brings you a close-up on all the great features built into ServiceDesk Plus 11.1. Learn how resource management helps you distribute tasks among your techs; add images to your service templates; customize your application pages by user, and much more.

Send Custom HTML Email Notification with Power Automate Outlook Connector

Two years ago, I wrote a similar post on Microsoft Flow: How to pass the SQL data table results in a Markdown-formatted table into an Email notification or Approval Requests. It is still quite up to date, i.e., it is an excellent solution that you can still use today. The only problem with that article is that I was using “send an email” action in Power Automate Outlook connector that is currently deprecated.

Azure Monitor (Part 2): Azure Monitor Logs-Getting Started

In our previous post, we discussed the question: 'What is Azure Monitor and how does it work?' and also covered the two types of data it stores, at a high level. In this part, we will get ourselves started with Azure Monitor Logs. More specifically, we'll discuss how Logs are collected by Azure Monitor or, in other words, what options you have to add data sources to Azure Monitor so you can display that data in a way that makes sense to you.

Istio vs. Linkerd vs. Envoy: A Comparison of Service Meshes

In a previous article, we examined service meshes in detail. Briefly, a service mesh takes care of network functionality for the applications running on your platform. As Kubernetes has matured as a technology, service meshes have become a hot topic, with various products being developed to solve the challenges associated with areas like traffic management, security, and observability. This article will compare three service meshes.

How to Quickly Identify Suspicious Network Behavior With Intuitive Dashboards in SolarWinds SEM

Log and event data are a boundless and valuable resource for identifying suspicious network activity and stopping potential breaches. However, analyzing lines and lines of text-based data can make this resource more trouble than it's worth. In this video, we'll explore the different ways you can customize log data in an easy-to-understand and visual dashboard in Security Event Manager to help turn it into something you can act on.

SolarWinds Server Configuration Monitor Overview

SolarWinds Server Configuration Monitor (SCM) is designed to provide insights into Windows® server and application changes to help you pinpoint the root cause of performance problems faster. Detect, track, and receive alerts when changes occur, allowing you to correlate system performance against configuration changes, know who made changes, and compare configurations over time. SCM integrates with SolarWinds Server & Application Monitor, allowing you to extend troubleshooting of system and application performance from one unified console.