Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Linux Security Guide: How to Investigate Suspected Break-in Attempts in Linux

Scenario Linux has a number of built-in tools, commands and files which can track and store information about every user activity. These tools are common in most Linux distributions and can be used to investigate suspicious logins or failed login attempts into the system. In this article, we will talk about some of the initial methods to identify possible security breaches. We will use an Amazon EC2 instance to show these commands.

How to Look for Suspicious Activities in Windows Servers

Scenario You are running a large production environment with many Windows servers. There are multiple forests in the network and some forests have multiple domain controllers. Your Windows server security is paramount – you want to track and audit suspicious activities and view detailed Windows reports extracted from the Windows servers event logs.

Case Study: How the Largest Nordic Bank Improved Compliance & Ensured Comprehensive Data Protection

This bank needed to upgrade their customer recording communications analysis & troubleshooting abilities, to comply with required regulations. It was also important for them to identify and resolve problems proactively. By implementing XpoLog they managed to significantly shorten the ‘loss-of-recording’ durations, perform quick troubleshooting and get to the root cause fast. Their ability to analyze/monitor their environments became much simpler and more efficient.

Case Study: How did a leading ad-tech firm increase application quality & lower response time/AWS costs?

The firm runs hundreds of services which optimize online advertising. The company utilizes large amounts of data which is located both on-premise and on AWS. They wanted to: By using XpoLog the company created a single location that manages all the information from all the sources. The information is shipped to the XpoLog cluster and tagged to the relevant service/team. XpoLog is deployed and managed on AWS spot instances, reducing approximately 90% of the required hardware costs! Try XpoLog free.

Case Study: How One of the Largest Medical Care Providers in North America Made 200k+ Patients' Happier

This leading medical care provider manages thousands of facilities and dozens of various patient portals. They needed to find an efficient way to analyze and monitor different services, to obtain maximum availability of their systems – so that patients/doctors get the information they need without interruptions. By implementing XpoLog: Their environment consists of multiple applications, centralized in a main data center, which interacts with all their facilities.

ELK Log Analysis vs. XpoLog Logs Manager

We performed a comparison between ELK log analysis tool and XpoLog log management tool. Main points to notice when considering using ELK for your log analysis Vs. XpoLog: 1. XpoLog provides a unique auto mining technology which profiles systems and app log data. XpoLog tool is able to build automatic IT intelligence which helps to understand the source of the problem and subsequently correlate and compute trends on those problems and then create the search analysis queries for the user.

Access Logs Analyzer - Analyzing Website Performance in No Time

Website performance is a burning issue that matters to any IT professional who is responsible for the company’s website. Access logs performance analysis is used for analyzing all access logs for website performance: slow page load time, most frequent web pages and their errors, large web pages issues and more.

New Free App for Active Directory

In organizations which uses a Windows server environment, the vast majority of authentication and access control processes are managed within Active Directory. As a central and critical component for managing organizational IT resources, Active Directory logs contain valuable information which must be closely monitored and analyzed.