Operations | Monitoring | ITSM | DevOps | Cloud

eG Innovations

Auditing Capabilities in IT Monitoring Tools for Security and Compliance

It is critical that access to any configuration changes or management actions made to monitoring platforms are logged and traceably audited. In this article, I will help you learn how to discover the auditing capabilities in IT monitoring tools. You will learn how to audit and manage the monitoring platform itself and make sure that it is being used appropriately.

Role-Based Access Control (RBAC) in eG Enterprise

eG Enterprise is a single pane of glass that provides monitoring and oversight of every layer and tier of your IT infrastructure. However, this does not mean every user in the organization has the same view of the IT infrastructure or needs to use the tool in the same way. In fact, controlling a user’s view of the monitored applications and infrastructure, as well as their privileges to perform tasks and access data via Role-Based Access Control, is a critical feature for our customers.

AVD - Azure Virtual Desktop - Usage Trends and Statistics

Technology advancements have now made it possible for organizations to adopt virtual desktop technologies in a hassle-free manner, from the cloud. Microsoft’s multi-session Windows desktop technologies supported on Azure cloud allow admins to provision virtual desktops on-demand. Integration with Azure Active Directory and FSLogix ensures secure access with efficient profile management.

Troubleshooting Slow Azure Virtual Desktop (AVD) Logons

In order to troubleshoot slow Azure Virtual Desktop logons, it is helpful to have a complete understanding of the application and how it operates. Here, we will outline the architecture and key components of AVD, the impact of DNS on the connection flow, and how eG Innovations offers time saving tools to troubleshoot problems with AVD before they negatively impact your organization’s productivity.

Azure AD Monitoring

As the Azure cloud administrator, you need to know who is accessing your cloud resources, how they are access it, what they access, what changed, when they access and from where, etc? Azure AD (Azure Active Directory) provides answers to above by storing the information in two logs, the information stored in them is extremely valuable for troubleshooting, monitoring and for general security related work, the logs are.

Top 10 Requirements of Cloud Monitoring Tools

Most organizations are moving applications and workloads to the cloud. Our APM survey found that 88% of organizations had some form of cloud technology deployed already. At the same time, there are several misconceptions about the cloud. There are many who believe they don’t need monitoring tools for the cloud because their cloud provider will take care of all of their performance needs. This is a myth because cloud provider SLAs are mainly around infrastructure availability.

Amazon AppStream 2.0 vs Amazon WorkSpaces

Amazon offers two different services, Amazon WorkSpaces and AppStream 2.0, that can be used to deliver apps remotely either streamed via a browser or within a virtual workspace (desktop). Once you understand the differences between the two services the choice is usually clear from the use case. It is in fact common for organizations to use a mixture of both.

Five Key Monitoring Capabilities for Top Payment Gateway Performance in E-commerce Applications

Payment gateway outages and performance issues have a disruptive effect on your business. When customers cannot complete a transaction, it leaves them frustrated and anxious. Even if it is not an outright outage, customers are wary of a flaky payment experience. They are often reluctant to retry the transaction for fear of being charged twice. This results in abandoned purchases and lost revenue.

What is IaC?

I recently had a wonderful opportunity to contribute to the Computer Weekly Developer Network (CWDN) ultimate series on “Infrastructure as Code” that collected articles and overviews from vendors and experts operating in the IaC space to form a formidable reference on all aspects of IaC. My contributions were to offer some insight into our architecture that has been designed to monitor infrastructure that has been deployed as code automatically and without tedious manual configuration.