Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Data Storage Costs Keeping You Up at Night? Meet Archived Metrics

We all have been there! Getting the largest metrics plan available, turning on real-time monitoring, and…. You know what happens next… BIG BILL! With the explosion of telemetry from microservices, containers, and cloud stacks, engineering teams often have to choose between data and budget. To help our Splunk champions, we are introducing Archive Metrics to make storing data up to ten times cheaper.

The State of the Industry With Security Expert Matt Johansen

In this livestream, I talked to security expert Matt Johansen, a computer security veteran who has helped defend everyone from startups to the largest financial companies in the world. We talked about the current state of cybersecurity, why attacks are on the rise, and what can be done to prevent threats in the future. Matt’s blog covers the latest news in cybersecurity and also touches on mental health and personal growth for tech professionals.

OpenSearch vs Solr

Constructing a robust search engine functionality for your application or website is crucial to achieving effective monitoring and analysis. When discussing the best and most appropriate open-source search engines, two particularly popular solutions arise, OpenSearch and Solr. These solutions are very similar, offering the majority of the same features, capabilities, and use cases. However, there are differences between the two search engines that make them better tailored for particular scenarios.

The Modern SOC Platform

On April 24, 2024, Francis Odum, released his research report titled, “The Evolution of the Modern Security Data Platform” in The Software Analyst Newsletter. This report examines the evolution of modern security operations, tracing its evolution from a reactive approach to a proactive approach. It highlights the shift towards automation, threat intelligence integration, and controlling the costs of ingesting and storing data as crucial elements in enhancing cyber defense strategies.
Sponsored Post

How to Threat Hunt in Amazon Security Lake

Establishing a proactive security posture involves a data-driven approach to threat detection, investigation, and response. In the past, this was challenging because there wasn't a centralized way to collect and analyze security data across sources, but with Amazon Security Lake it is much simpler. Whether you're a security company improving and refining your threat intelligence for customers, or you're investigating security threats within your own environment, there are a few important things you need to know. This blog will cover the tools, frameworks and data types you'll need to threat hunt in Amazon Security Lake.

Leveraging Log Monitoring for Superior SaaS Performance

The combination of cost-effectiveness, scalability, accessibility, rapid deployment, and focus on core competencies has fueled the growth of Software as a Service (SaaS) applications, making them increasingly popular among businesses of all sizes and industries. However, because of this increased dependency on SaaS applications, it has become essential to conduct effective monitoring.

Log-based search and alert queries for syslog monitoring

Syslog entries offer crucial information about the health and status of various components within a system or network. Administrators can utilize syslog data to monitor system activities, identify anomalies, and take proactive measures to ensure system stability and security. In this blog, we'll share a few useful queries for monitoring syslog using Site24x7's log management features. These queries are meant to improve network visibility and simplify troubleshooting.

Webinar Recap: Mastering Telemetry Pipelines - A DevOps Lifecycle Approach to Data Management

In our webinar, Mastering Telemetry Pipelines: A DevOps Lifecycle Approach to Data Management, hosted by Mezmo’s Bill Balnave, VP of Technical Services, and Bill Meyer, Principal Solutions Engineer, we showcased a unique data-engineering approach to telemetry data management that comprises three phases: Understand, Optimize, and Respond.