Operations | Monitoring | ITSM | DevOps | Cloud

The Unplanned Show, Episode 7: Death of the Single Security Pane of Glass with Heather Hinton

In this episode, Heather Hinton describes how security teams can evolve away from spending cycles on “silly little jobs” and scouring multiple sources to try to identify the kinds of unplanned interrupt work that needs to be dealth with urgently. Instead, they can complete projects faster and take on more because on-call rotations are spent getting work done (with the occasional interruption) instead of “seeking” for the interrupt work. We also discuss how this fits in with encouraging broader employees to participate in security hygiene practices.

Analytics Plus webinar: A guide to consolidating IT operations data into a unified dashboard

Are you still implementing strategies from siloed data? Struggling to pinpoint the root cause of IT downtime? Unable to formulate strategic decisions due to a lack of operational visibility? Organizations run daily operations on a large ecosystem of interwoven IT applications, and often struggle to centralize this disjointed data. These disparate data sources provide partial insights, and derail organizational growth. By consolidating IT data, you can gain complete visibility into IT operations and formulate data-driven strategies.

Sumo Logic Customer Brown Bag - Observability - July 31st, 2023

In this session, Jeff Deininger, Architect Solutions Engineer from Sumo Logic, shows how to perform version control using Sumo Logic API. If you are interested in an engagement to receive additional guidance from Sumo Logic's Professional Services team, please reach out to your Sumo Logic Account Manager and/or Customer Success Manager.

Creating Allowed IPs

In this tutorial, we'll guide you through the process of creating allowed IPs for PostgreSQL on the Aiven platform. Ensuring secure access to your database is essential, and Aiven provides robust security features to help you protect your PostgreSQL instances. We'll show you how to configure the allowed IPs or whitelist specific IP addresses to establish controlled access to your Aiven PostgreSQL database. By implementing IP filtering rules, you can restrict connections to trusted sources and enhance the overall security of your database. Join us as we explore the step-by-step process of managing allowed IPs on Aiven and leverage the platform's security settings to safeguard your PostgreSQL environment.