Operations | Monitoring | ITSM | DevOps | Cloud

January 2025

Why Data Tiering is Critical for Modern Security and Observability Teams

In today's digital landscape, security and observability teams face an unprecedented challenge: managing massive volumes of data while maintaining both performance and cost-effectiveness. As organizations generate more data than ever before, the traditional approach of storing everything in high-performance, expensive systems is becoming unsustainable. How will your team evolve how it manages and uses telemetry data across the enterprise?

Cribl Surpasses $200M ARR!

I’m so excited to share that Cribl recently surpassed $200 million in annual recurring revenue! This milestone and our rapid growth comes down to one thing: Solving real problems for our customers. The more our customers partner with us and use Cribl products to simplify their telemetry data management, the more our business grows and the more milestones we’ll hit together. Thank you to our fantastic customers and partners who have helped us reach this point in our journey!

Master Telemetry Replay with Cribl Stream and Cribl Lake

What do you do when an incident occurs, and you need to investigate and troubleshoot? Replay data. What about performing audit trails for compliance and reporting? Replay data. Need to do system testing and validation? Replay data. There are countless reasons to replay telemetry, but the ease of doing so largely depends on the tools and infrastructure you have in place. Manual replay is often cumbersome and time-consuming, requiring access to stored raw data in logs or files.

Trusting Cribl: Strengthening Your Software Supply Chain with Transparency and Security

Let’s face it—the term "software supply chain" can feel like navigating a maze of tech jargon. Commit signing, Software Composition Analysis (SCA), eBPF monitoring, SBOM generation, provenance attestations… the list goes on. But at its core, the software supply chain is the backbone of modern development, and its security is non-negotiable. A single vulnerability in this chain can ripple through entire systems, leading to breaches, downtime, and reputational damage.

Navigating 2025: Turning Uncertainty into Opportunity

The end of the year for technology companies always brings with it a raft of new predictions for the coming twelve months. Many predictions, breathlessly delivered, suggest a tenuous future can be conveniently avoided with the appropriate application of vendors’ products. Using predictions as a way to shill products is boring, and it misses an opportunity to help enterprises plan for the coming year. After all, predictions don’t have to be correct to be useful.