Operations | Monitoring | ITSM | DevOps | Cloud

For the Users: Customer-Driven Development

“Always design with the customer in mind,” they say. “We listen to our customers,” they say. And they’re right. But why not actually ask the customers what they want and just build what they’re asking for? “We might be driven off-track if we implement what our customers want.” This may come up as an argument to stick to the vision path and never deviate from the roadmap. However, in the end, aren’t we trying to build something for the customers?

New integration offers a consolidated look at your APM alerts

Application monitoring and alerting go hand-in-hand. Alerts point out critical issues in your infrastructure and help you identify and remediate components causing service degradation and disruption. To reduce the complexity involved in managing IT alerts, we’ve developed an integration between our application monitoring tool, Applications Manager, and our alert management solution, AlarmsOne.

Sponsored Post

EventSentry v4.0 - Introducing ADMonitor

Since Active Directory is the foundation of all Windows networks, monitoring Active Directory needs to be part of any comprehensive security strategy. Up to version 3.5, EventSentry utilized Windows auditing and the security event log to provide reports on: User Account Changes, Group Changes and Computer Account Changes.

An Introduction to Big Data Concepts

Gigantic amounts of data are being generated at high speeds by a variety of sources such as mobile devices, social media, machine logs, and multiple sensors surrounding us. All around the world, we produce vast amount of data and the volume of generated data is growing exponentially at a unprecedented rate. The pace of data generation is even being accelerated by the growth of new technologies and paradigms such as Internet of Things (IoT).

Everything You Need to Know About the OSS Licensing War, Part 2.

Where we left off: AWS had taken the Elasticsearch software and launched their own cloud offering in 2015, and Elastic N.V. had doubled down on an “open core strategy.” Once AWS decides to offer a project like Elasticsearch, it immediately becomes a truly formidable competitor to anyone trying to do the same, even the company behind the software itself. AWS has huge scale, operational expertise, and various network effects that really compound.

Zero Trust Security: Supporting a CARTA approach with Continuous Monitoring

Learn how to support a continuous adaptive risk and trust assessment (CARTA) approach leveraging accurate Kubernetes flow logs. 5-tuple logging is commonly used to monitor and detect anomalies and produces unreliable data that cannot accurately identify anomalies nor prove enforcement of security policies.

Zero Trust Security: Supporting a CARTA approach with Anomaly Detection

Learn how Anomaly Detection supports, what Gartner has termed, a continuous adaptive risk and trust assessment (CARTA) when building a CaaS platform using Kubernetes. Anomaly Detection expands the zero trust network security model and continuously assess the application and network risk that enables adaptive policy adjustments.