Operations | Monitoring | ITSM | DevOps | Cloud

Announcing Datadog Security Monitoring

With the growing complexity and velocity of security threats in dynamic, cloud-native environments, it’s more important than ever for security teams to have the same visibility into their infrastructure, network, and applications that developers and operations do. Conversely, as developers and operations become responsible for securing their services, they need their monitoring platform to help surface possible threats.

SCOM 2019: What's next

"Who doesn't love monitoring?" said no one ever. Well, no one but me. Seriously. I love monitoring, but oftentimes I felt like I was the only one. After 23 years at Purdue University I decided that it was time to change things up, try something new, and start looking to see if monitoring could be fun, interesting, and actually creative for someone other than myself. Surprisingly for me, SquaredUp was also interested in the same thing!

Customize Your Sentry Workflow: A Sample Internal Integration

This year we introduced the Sentry Integration Platform, which allows 3rd-party developers to build integrations that connect Sentry with their software. More recently we launched Internal Integrations, which lets developers combine Sentry with their internal tools to support their own custom workflows.

[PromCon Recap] Two Households, Both Alike in Dignity: Cortex and Thanos

This blog post is a writeup of the presentation Bartek Plotka and I gave at PromCon 2019. Cortex is a horizontally scalable, clustered Prometheus implementation aimed at giving users a global view of all their Prometheus metrics in one place, and providing long term storage for those metrics. Thanos is newer project aimed at solving the same challenges. In this blog post, we compare these two projects and see how it is possible to have two completely different approaches to the same problems.

Now or never: Your last stand against cyber attacks.

The Global Risks Report 2019 states that cyber attacks are one of the top five risks to global stability. In the cyber world, there are just two categories of people: one category who've realized that they've been attacked and the other category who are yet to realize. In this technology-infused world, anybody can become a hacker with just $1; that's how critical cyber security is.

Secret Keys to the Password Kingdom

Building trust with customers is a must for MSPs. And because of the unique nature of MSPs, it’s not always easy. Your customers aren’t simply giving you administrative access to a few admin accounts—they’re sharing secrets which must be securely managed across all the systems, apps, and users you manage for them. Passwords, SSH keys, licenses, cloud infrastructure logins, and SaaS portal accounts are just the beginning. To solve issues quickly, your technicians can’t waste time locating the credentials needed to resolve issues and make users happy.

Predictive Analytics to Improve Decision Making

Predictive analytics for networks are helping businesses optimize their network performance, anticipate network capacity related requirements, and eventually forecast future much more efficiently than ever. Gartner has estimated the value of network monitoring software market at roughly $2.1 Billion, this figure is presently increasing at a growth rate of 15.9% annually. The demand for predictive analytics in network monitoring software has grown beyond enterprises and datacentres.

A Brief Introduction to Containers

Whether you’re new to development or a seasoned developer, containers have proven to be game-changing in building, testing, and deploying applications. This article is meant as a quick introduction to the world of containers. To get started, you’ll need to install Docker to follow along with the examples. If you haven’t installed Docker yet, head over to their website to get it installed. There are free versions available for all major operating systems.