Operations | Monitoring | ITSM | DevOps | Cloud

How to monitor networks for dummies. Here is what you need

Ok, so you own a company, now what? All right, then one of the million things to keep in mind, in addition to the plant that you are going to buy for your office, is learning how to monitor networks. Think that if your computerized network stops working properly (for any reason) and the data that normally flows through it does not, the company is not functional anymore, during the whole time the disaster lasts.

8 Must-Have SaaS Tools For Your Ecommerce Business

It’s sometimes said that getting ahead in business (as opposed to, say, academia) comes down to who you know, not what you know. Things are different still in ecommerce. When you’re selling online at scale, success is more closely linked to the tools you use. Everyone has access to the same research and networking resources, and the software you rely on determines everything from the amount of free time you have to the quality of your work.

Announcing Graylog v3.0 Release Candidate 1

Today we are releasing the first release candidate of Graylog v3.0. This release brings a whole new content pack system, an overhauled collector sidecar, reporting capabilities, improved alerting with greater flexibility, a new script alert notification plugin, support for Elasticsearch 6.x, a preview version of an awesome new search page called Views, and tons of other improvements and bug fixes.

NiCE Linux Power MP 1.00 released

Speed up your IBM Power servers like never before. In IBM Power System environments, processing time is costly and is measured in work units. A CPU hog on any Linux server can become expensive. Under-provisioned systems react slowly on queries from business applications, which then cause undesired end user or processing delays. As IBM Power servers typically run business critical workloads, response time and availability is key.

Types of DNS Attacks and How Application Monitoring Can Help

DNS, the Domain Name Service, is the Internet service that translates IP addresses into hostnames, and visa versa. It enables you to type www.exoprise.com in a browser, or send an email to someone at that domain, and have your request actually go to 35.172.52.247. As a vital part of the Internet infrastructure, DNS attacks can have a serious impact on your online operations, including access to your website and email.

Announcing the latest dashboard enhancements

When we first released our custom dashboard over a year ago, we had the needs of our customers in mind. The customizable tiles go a long way in ensuring that the dashboard meets your data display needs while being easy to use. We’re always improving the Raygun dashboard—here’s the latest from the app team.

SIEM vs. Security Analytics

SIEM has been with us for almost two decades now and is seen as a proven approach to dealing with potential threats as well as actual attacks on business critical systems. But today, it is becoming clear that changes in IT infrastructure and deployment practices are giving rise to new challenges that cannot be met by existing SIEM platforms.

Apply for Sentry's Open Source Grant

Work should be fun. Sometimes it’s not, especially when your full-time job isn’t aligned with something you care about — like open source. Contributing to open source full-time is an opportunity not available to everyone. We’d like to change that with the Sentry Open Source Grant, which offers funding to an individual dedicated to working on an open source project for three months.

Windows Management Instrumentation in remote monitoring

Pandora FMS features include decentralized monitoring, which is based on several standards and/or protocols of common and open use (SNMP v1 and v2 -v3 from version 7.0 NG 727-, ICMP and WMI). In this article we will talk about the latter, starting from the simplest and with references to each of the articles published here in your blog.