Operations | Monitoring | ITSM | DevOps | Cloud

Cloud

The latest News and Information on Cloud monitoring, security and related technologies.

Securing Azure SQL Database, Part 3: Service Endpoints

In previous installments of my “Securing Azure SQL Database” series, I covered Azure SQL Database firewall rules and private endpoints—the first of which is a way to help reduce the public exposure of your database endpoint and the second being a means to remove all public access if necessary. Each option has unique benefits, and some scenarios might call for a mix of the two options.

Monitoring AWS EC2 with Splunk Observability

Today, much of our online world is powered by cloud computing, and Amazon Web Services offers an amazing depth and breadth of available services. However, most of the time it starts with Amazon Elastic Compute Cloud, EC2. EC2 is powered by virtual servers called instances and allows users to provision scalable compute capacity as desired. This means no server hardware investment and the ability to scale up or down in response to demand (thus elastic).

What Is SaaS Finance? (Plus 12 Metrics You Should Be Monitoring)

One of the most important things SaaS companies need to think about in order to be successful is financial modeling. To succeed in the increasingly competitive SaaS space, finance teams need to carefully consider a wide variety of KPIs and find ways to effectively manage both present and future cash flows. Cash flows and liquidity are two of the most common challenges faced in this industry — if effectively addressed, your company can position itself for long-term success.

Choosing Azure Instances for Microsoft WVD: Community and Vendor Resources

In an earlier blog, we had discussed what is Microsoft Windows Virtual Desktop (WVD) and why it is gaining popularity. In this blog, we present various community and vendor resources that can help you choose the right Azure instances for your Microsoft WVD deployment. Here, at eG Innovations, we offer a wealth of monitoring and simulation tools to allow you to monitor what real users are experiencing when accessing Microsoft WVD.

Webinar: How Medtronic Tripled Serverless Development Velocity

In this webinar, experts from Medtronic and Lumigo review the architecture and monitoring setup of Medtronic's AWS serverless environment, which processes more than a billion Lambda requests a month. They will show real-world examples of how the Medtronic serverless dev team quickly finds areas for improvement and acts on them.

Monitor applications on GKE Autopilot with the GKE Dashboard

Elite software development teams automate and integrate monitoring observability tools more frequently than lower performing teams, per the Accelerate: State of DevOps report. Organizations that need the highest levels of reliability, security, and scalability for their applications choose Google Kubernetes Engine (GKE). Recently we introduced GKE Autopilot to further simplify Kubernetes operations by automating the management of the cluster infrastructure, control plane, and nodes.

Comparison: Snyk, Aqua Security, Sysdig

Security testing tools help us to monitor our cloud-native resources for potential vulnerabilities throughout our development lifecycle. By flagging security vulnerabilities early, our teams can react on time to reduce potential damage to our end-users and our business. This post will compare three different Security scanning tools that focus on cloud-native infrastructure and application security, namely.

Detect unauthorized third parties in your AWS account

Detecting when an unauthorized third party is accessing your AWS account is critical to ensuring your account remains secure. For example, an attacker may have gained access to your environment and created a backdoor to maintain persistence within your environment. Another common (and more frequent) type of unauthorized access can happen when a developer sets up a third-party tool and grants it access to your account to monitor your infrastructure for operations or optimize your bill.

Cloud SIEM accelerates modernizing security operations across Asia Pacific

Security operations is now a critical business function tasked with securing digital transformation initiatives, to effectively mitigate evolving attacks and expanding attack surfaces, handle complexity and tool proliferation while teams are continuing to be virtual and distributed.