Learn how to create custom functions for quicker resolution times, integrate with third-party applications, measure service desk performance, and identify gaps in service delivery.
Stackdriver Transparent SLI Monitoring provides detailed API level metrics for developers and IT teams to quickly diagnose a problem and pinpoint where the error is located, whether it is with your stack or with the service provider.
Learn about how artificial intelligence for IT operations, or AIOps, can transform your organization, helping them shift from reactive to predictive IT.
Learn about the predictive analytics capabilities of Splunk IT Service Intelligence and the value it can bring IT and the business, helping you shift from reactive to predictive IT.
Learn the basics for how to search, parse and analyze the logs and metrics that are important to your organization. This session will guide you through running searches, simple parsing and basic analytics on your data. Learn how to convert your queries to charts and add them to Dashboards to help you visualize trends and easily identify anomalies. Lastly, learn how Alerts can help you stay on top of your critical events.
Designed for users, this series deep-dives into every aspect of analyzing your data. Run as a "how-to" webinar, this session walks viewers through data searching, filtering, parsing, and advanced analytics. This series concludes with "how to"details to create dashboards and alerts to monitor your data and get Sumo Logic to work for you.
In this Webinar, Nancy Gohring, Senior Analyst at 451 Research, and Elik Eizenberg, CTO and Co-Founder at BigPanda, discuss IT Operations, Machine Learning and the importance of Transparency, Trust and Control so that IT Ops leaders and practitioners can choose the right tools to support their critical digital transformation initiatives.
As business applications shift from living on-premises to the cloud, it may not always be necessary to enable communication between user devices. In fact, preventing your clients’ user devices from contacting each other—part of a zero-trust network approach—could prevent a malicious cyber attack from spreading and costing clients major data recovery fees.
As an MSP, your first line of defense for clients is visibility. You need to know exactly which devices you’re protecting and how those devices are configured. You also need to know what your client’s users are doing out there in the cyber wilds. Without these insights, you’re flying blind in a crazy fast-paced world of threats and risks. In this one-hour webinar from ID Agent and Auvik Networks, we’ll demonstrate how what you don’t.