Operations | Monitoring | ITSM | DevOps | Cloud

Puppet Edge Across Lifecycle: Day 0, Day 1, and Day 2

Puppet Edge extends your Puppet automation to now include all your network devices, providing a centralized platform to manage your entire infrastructure, enabling teams to work together efficiently. Automate tasks, manage configurations, and ensure compliance across all your devices from one place. This video discusses how to use Puppet Edge for Day 0 planning and provisioning, Day 1 device configuration, and Day 2 ongoing operations, streamlining your workflows, and reducing manual errors.

Tech Talk - Leveraging Automated Threat Analysis Across the Splunk Ecosystem

Find out how Splunk Attack Analyzer can help you quickly and efficiently investigate potential malware and phishing incidents by automatically tracking each stage of complex attack chains and expediting your response efforts. Hear directly from Product Manager Aditya Raj as he demonstrates how to combine Splunk Attack Analyzer with Splunk Enterprise Security and Splunk SOAR for even greater threat detection and response power.

MSP Dashboards That Deliver: HaloPSA + SquaredUp in Action

In this webinar HaloPSA and SquaredUp come together to show MSPs how to unlock real-time visibility, streamline reporting, and deliver dashboards that drive client satisfaction and operational efficiency. In this session, you’ll hear directly from both Halo and SquaredUp teams as they: Whether you're already using HaloPSA or exploring smarter ways to surface your service desk data, this webinar will give you the insights and tools to take your MSP reporting to the next level.

Network Path Monitoring: How to Monitor Network Paths

Your users are complaining about slow application performance. Your monitoring dashboard shows all devices are green, routers operational, switches functioning, and bandwidth utilization is normal. Yet something is clearly wrong. The problem isn't your equipment; it's the path between your users and their destinations. This is where network path monitoring comes in.

The Hidden Cost of "Modernization": When Upgrades Become Extortion

Across the IT and observability landscape, enterprise leaders are facing a troubling pattern. A trusted vendor announces a “modernization initiative,” often following a major acquisition or a shift in ownership. Overnight, pricing structures change, license models disappear, and long-time customers are pressured into multi-year bundles under the banner of innovation. What’s being framed as progress often feels more like pressure.