Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Advanced analytics for ServiceDesk Plus' ticket history, projects, and knowledge base modules

We’re happy to announce the release of advanced analytics for three more ServiceDesk Plus modules: Request transition history, Projects and Knowledge base management. Read on to see how this integration between ServiceDesk Plus and Analytics Plus gives enterprises better visibility into their help desk activity.

Conquer it with correlation-Part 2: The data breach

In my previous post, we looked at how event correlation can be used to deal with advanced persistent threats (APTs). The thing is, an APT is just one ugly face of a much larger epidemic: the data breach. In this blog, we examine this larger problem and the role of event correlation in securing sensitive data.

Conquer it with correlation-Part 1: The advanced persistent threat (APT)

Among all the pesky attacks that keep security administrators working late, advanced persistent threats (APTs) are possibly the most lethal. An APT is a long-term, targeted attack which involves stealthily spying on an organization’s network activity or siphoning off sensitive data, as opposed to openly damaging or locking down network resources.

Better functional invoices, new integrations, and more introduced in ServiceDesk Plus MSP 9410

Your trusted MSP service desk software just got a whole lot better with a set of new features and enhancements to take your IT support experience to greater heights. We’re excited to share with you ServiceDesk Plus MSP’s newest release, where we’ve focused on taking what you, as a managed service provider, need for your business to thrive—and make world-class IT support for customers, a reality.

Top metrics to consider while monitoring DynamoDB performance

NoSQL databases have always been regarded as a notch above SQL databases. The primary reason for the soaring popularity of NoSQL databases is their dynamic and cloud-friendly approach to seamlessly processing data across a large amount of commodity servers. With high scalability, availability, and reliability, AWS’s DynamoDB is a great example of a fully-managed NoSQL database.

Five cybersecurity best practices to follow in 2019

Research by Cybersecurity Ventures predicts ransomware alone will cost businesses around the world more than $11.5 billion in 2019. What’s worse, this same study also predicts businesses will experience a cyberattack every 14 seconds by 2019, up from once every 40 seconds in 2016. So what can you do to mitigate the increasing threat of cyberattacks? Here are five IT security best practices that can help.

OpManager doubles the number of device templates, cuts your work in half

Just last month we heard flattering statements about OpManager’s UX, and nothing makes us happier than knowing that our continuous improvements have positively impacted our users. We’re always eager to meet your growing IT infrastructure needs, so we’re happy to introduce a set of 4,000 new device templates. That doubles the number of OpManager device templates to over 8,000, helping you in your goal of comprehensive network management.

How to avoid getting tricked by hackers this Halloween

While everyone prepares for the frights of Halloween, there’s a real evil lurking just out of sight—an imminent threat that grows stronger each passing day. And no amount of burning sage, sprinkling salt, or carrying garlic will ward off this threat. Gather around folks, for in October, not only do we celebrate Halloween, but also National Cybersecurity Awareness Month.

Industry best practices for endpoint security

Lately, hackers on the lookout for vulnerable systems have kept the IT industry busy. While various OS and software vendors strive to keep their users’ data intact by providing timely updates, manually securing endpoints by applying these updates is challenging due to factors such as time, staffing, and IT budgets. To help admins out, we’ve compiled a list of some industry best practices you can implement to stay vigilant against cyberattacks and data theft.

Key metrics for Elasticsearch performance monitoring

Elasticsearch is a highly scalable, distributed, open-source RESTful search and analytics engine that offers log analytics, real-time application monitoring, click stream analytics, and more. Elasticsearch stores and retrieves data structures in real time. It has multi-tenant capabilities with an HTTP web interface, presents data in the form of structured JSON documents, makes full-text search accessible via RESTful API, and maintains web clients for languages like PHP, Ruby, .Net, and Java.