Operations | Monitoring | ITSM | DevOps | Cloud

Behind the Dashboard - Catchpoint Traceroute

Behind the Dashboard is an ongoing series where we look under the hood of a specific Catchpoint feature. Each episode breaks down the technology itself, what’s challenging about using it for monitoring, and how we removed friction and toil to make it a valuable part of the Catchpoint platform. In this episode Leon, Brandon, and Sergey take a look at “traceroute” tests – a feature that may seem humble and unassuming, but has unexpected power and utility when it comes to identifying performance issues with your site, service, or application.

Ten Minute Troubleshooting: Meet (and Monitor) Users Where They Are

What do you do if your monitoring, APM, and synthetic tools tell you an application is up, but the users say it’s not? A good first question is to ask where your monitoring tools are located relative to both the users and the application itself. In this episode Mursi helps Leon identify his “red-light, green light” issue and adjust his monitoring to do a better job showing the REAL user’s experience.

IT Horror Stories: ITOops Ep12 S1

In the spine-tingling finale of IT Horror Stories, host Jonathan Crowe is joined by a fearless lineup of IT veterans who have stared into the digital void and lived to tell the tale. Guests Kallum Kyle, Senior Sysadmin at Storable; Josh Adcock, Director of Client Services at The Tech Doctor; and Adam Walter, Founder of Humanize IT, recount their most harrowing experiences from the trenches of tech. They relive moments when end users were their only hope, when vulnerable software lurked like ghosts on forgotten networks, and when automation backfired so badly it cost them their jobs.

Mobile Security Isn't a Nice-to-Have - It's an Absolute Must

Mobile Security Isn’t a Nice-to-Have — It’s an Absolute Must According to the Verizon’s 2024 Verizon Mobile Security Index Report, nearly 90% of organizations recognize the urgent need to take mobile security seriously. Are you one of them? From mobile phishing to smishing, vishing, quishing and zero-day threats, the mobile attack surface is bigger and more dangerous than ever. Cybercriminals are relentlessly targeting mobile devices as a gateway to your organization, making mobile security especially critical.

Microsoft Office 365 Update and Linux Security Enhancements

Microsoft extends rollback support for Office 365 updates to two months and discloses a vulnerability without zero-day exploits. SQL updates now require specific version and driver fixes. Ivanti releases three security updates addressing 11 CVEs, while a partnership with Tuck Care improves Linux patching. Misconceptions about Linux security are addressed, emphasizing the need for regular updates to mitigate risks from notable CVEs across distributions.

How to Block Apps on Android Business Devices?

Are you an IT administrator looking for an efficient way to manage company-owned Android devices? This video provides a step-by-step guide on how to block apps on Android devices to boost employee productivity and maintain security. In a business environment, a clear app usage policy is essential for compliance and focus. We'll show you how to easily set up an App Blocklist using the AirDroid Business MDM solution.