Boston, MA, USA
Jul 18, 2019   |  By Evan Klein
As discussed in our blog post [What is User Activity Monitoring?], user activity monitoring (UAM) is a form of surveillance that provides visibility and insight into employee productivity and engagement while also revealing insider security threats. While UAM on company-owned or company-sanctioned devices and networks is legal, ethical and HR considerations require that UAM be implemented with a high level of professionalism and sensitivity.
Jul 17, 2019   |  By Evan Klein
User Activity Monitoring (UAM) tracks the behavior of internal end-users—employees, subcontractors, partners, and so on—on a company’s networks, devices, and other IT resources. UAM, sometimes also called employee monitoring, may be deployed for a number of reasons, such as providing insight into the productivity of both individual employees and the company as a whole. Is Employee X spending too much time browsing the internet for non-business purposes during work time?
Jul 16, 2019   |  By Daniel Berman
In a previous post, I explained the role Apache Kafka plays in production-grade ELK deployments, as a message broker and a transport layer deployed in front of Logstash. As I mentioned in that piece, Redis is another common option. I recently found out that it is even more popular than Kafka! Known for its flexibility, performance and wide language support, Redis is used both as a database and cache but also as a message broker.
Jul 15, 2019   |  By Evan Klein
DevOps, security, and SOC teams find themselves constantly facing new cyber threats, ever-evolving attackers, and innovative attack vectors. Their challenges range from protecting employees’ mobile devices to preventing malicious parties from accessing an organization’s financial data or customers’ personal information.
Jul 11, 2019   |  By Daniel Berman
Open source is one of the key drivers of DevOps. The need for flexibility, speed, and cost-efficiency, is pushing organizations to embrace an open source-first approach when designing and implementing the DevOps lifecycle. Monitoring — the process of gathering telemetry data on the operation of an IT environment to gauge performance and troubleshoot issues — is a perfect example of how open source acts as both a driver and enabler of DevOps methodologies.
May 16, 2019   |  By logz.io
Adoption of cloud services and Azure services in particular has exploded in the last few years – over 60% of enterprises now use Azure. As Azure users deploy ever more sophisticated application architectures, it becomes even more important to have a logging and monitoring system that can handle the complexity. The ELK stack is the most popular tool for this, but comes with its own challenges.
Apr 21, 2019   |  By logz.io
View an overview of Logz.io's Security Analytics - a unified platform for operations and security and built on top of the ELK Stack. Includes threat detection, rules, compliance and monitoring reports, integrations, and more.
Dec 12, 2018   |  By logz.io
Learn methods for implementing Timeless Accounts with Data Optimizers and learn how these powerful features can increase the duration of critical metric retention while bending the cost curve to save money.
Nov 15, 2018   |  By logz.io
Logz.io is an intelligent log analytics platform that combines the popular ELK stack as a cloud service and sophisticated machine learning. Logz.io derives insights from machine data, user behavior and community knowledge in a scalable, production-ready platform that enables organizations to resolve issues faster and take operations to the next level.