Operations | Monitoring | ITSM | DevOps | Cloud

C1 Earns Cisco 360 Preferred Status in All Six Portfolios

C1 is proud to announce that we have achieved Cisco 360 Preferred Partner status across all six Cisco portfolios — Networking, Security, Collaboration, Services, Cloud & AI Infrastructure, and Splunk. This milestone represents more than a designation. It reflects the depth of our technical expertise, the breadth of our architectural capabilities, and our commitment to delivering measurable business outcomes across the entire Cisco portfolio.

Accelerating MTTR with Faster Root Cause Diagnosis: AI Advisor Now Supports On-Demand Connectivity, Config Context, and Device Diagnostics

Knowing something is broken is easy. Figuring out why is hard. Introducing three new, native AI diagnostic capabilities in the Kentik Network Intelligence Platform to accelerate root cause analysis and keep your network running better.

What is Cloud Threat Detection? An Ultimate Guide for 2026

What if the next breach in your cloud is already in motion, and your team has no idea how to see it? Cloud workloads are growing fast. APIs, identities, and data are spread across AWS, Azure, GCP, and on-prem systems all at once. Every layer creates its own logs, its own alerts, and its own blind spots. Most security teams are short on visibility, context, and time. That is the gap cloud threat detection is built to close.

Understanding Long-Term Cloud Migration Cost Savings

Whether you’re a small start-up or a large-scale enterprise, data storage and backups are a necessity for a business to run smoothly. While many businesses may need on-premises storage for maximum control, this can be expensive, so if you’re wondering about the cloud migration cost savings when using a company like Internxt S3, this article will cover everything you need to help migrate or store data in the cloud.

ActiveMQ Security Hardening: TLS, JAAS, LDAP & CVE Patch Guide

In October 2023, security researchers published CVE-2023-46604, a CVSS 10.0 remote code execution vulnerability in Apache ActiveMQ. Within days, it was being actively exploited in ransomware campaigns. The attack required nothing more than network access to port 61616. No authentication, no credentials, no social engineering. The attacker connected to the standard ActiveMQ port and executed arbitrary code on the server.

AI in Software Delivery: Engineering Excellence or Just Market Hype? | Harness Blog

AWS re:Invent 2025 made one thing very clear: enterprise interest in AI is no longer theoretical. The conversation has moved beyond curiosity. Teams are actively experimenting, leaders are looking for production-ready use cases, and engineering organizations are trying to figure out where AI can create real leverage across software delivery, security, platform engineering, and operations.

Faster incident investigation with BigPanda and ServiceNow Now Assist

When an incident occurs, an L2/3 engineer or SRE can spend 20–30 minutes investigating across alert consoles, combing through change records, and pinging teams on Slack or Microsoft Teams. When you multiply that time spent across thousands of incidents per year by the cost of an IT outage at $14,056 per minute, the cost is staggering. Enterprises can’t afford to waste time searching across disparate tools.

The most debated DORA metric (even Google debates this)

What's the most debated DORA metric? Nathen H from Google's DORA team breaks down the change lead time debate — and why even the experts can't fully agree on when a change is "committed." Is it at commit? After merge? The answer matters more than you think. Subscribe for more DevEx and DORA insights from our Web Summit series.