Operations | Monitoring | ITSM | DevOps | Cloud

Running Lambdas on your Laptop

Serverless has the potential to bring massive ops advantages to projects of all sizes, but while it presents great business benefits, we need to spare a thought for how teams develop on serverless. I recently published ‘Serverless Development is Broken’ a list of concerns about how developers can work with long deploy times inherent in a cloud-only code environment.

S3 Security: How to Easily Secure and Audit AWS S3 Buckets?

Amazon S3 is an object storage service widely used for storing many different types of data in the cloud. While it’s inexpensive and easy to set up and maintain S3 buckets, it’s also very easy to overlook S3 security aspects and expose them to malicious attacks. A typical example is accidentally allowing public access to S3 files. Several recent high-profile data breaches were caused by lax S3 security.

Kubernetes as a Service: GKE vs. AKS vs. EKS

Kubernetes (K8s) is a prevalent open-source system for automating the deployment, scaling, and management of containerized applications. However, maintaining the service can be difficult and expensive. For that reason, it is easy to find platforms offering Kubernetes as a managed service. In this article, we will analyze three of the most popular services currently available: Google Kubernetes Engine, Azure Kubernetes Service, and Amazon Elastic Container Service for Kubernetes.

Kubernetes Master Class: How to Secure Production Kubernetes and Service Mesh Workloads on Rancher

As more container deployments move into production there will be an increasing level of attacks on application containers and the orchestration tools to manage them. The success of Kubernetes has been a major enabler for the “service mesh” concept to become a reality, as a “sidecar” container is the ideal form-factor for service mesh functions to be placed together with the service itself. The important thing to remember is that, although a service mesh has security features, it is NOT a security solution. It is not designed to provide the type of network, endpoint and host security required for defense in depth.

ManageEngine recognized as a May 2019 Gartner Peer Insights Customers' Choice for Network Performance Monitoring and Diagnostics Software

2019 continues to be a great year for ManageEngine accolades. This time, we are proud to announce that we’ve been named a May 2019 Gartner Peer Insights Customers’ Choice for Network Performance Monitoring and Diagnostics Software. The consistent performance of our network performance monitoring (NPM) solutions—OpManager, NetFlow Analyzer, and Network Configuration Manager—has been the driving force behind this recognition.

Better Together: DX AIOps and Intelligent Automation

Organizations are rapidly adopting AI first strategies to power digital business models. Hear Broadcom executives Kieran Taylor and Ralf Paschen share our approach for AI-driven automation for the digital business. In this video, you'll learn why having intelligent automation aligned to AIOps enables the promises of delivering AI-driven digital experiences.

Stop Focusing on Time to First Byte and Do This Instead

Metrics are the lifeblood of every data-driven decision. Question after question on forums like Reddit, Stack Overflow and other IT communities ask which metrics teams should focus on for improving website speed and end-user experience. There’s a push in web development circles to focus on Time to First Byte (TTFB) to measure and improve website speed. But every viewpoint has its opposition.