Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

What Is SaaS Finance? (Plus 12 Metrics You Should Be Monitoring)

One of the most important things SaaS companies need to think about in order to be successful is financial modeling. To succeed in the increasingly competitive SaaS space, finance teams need to carefully consider a wide variety of KPIs and find ways to effectively manage both present and future cash flows. Cash flows and liquidity are two of the most common challenges faced in this industry — if effectively addressed, your company can position itself for long-term success.

Proactive Monitoring in Digital Transformation Times

Pandora FMS is a proactive, advanced, flexible and easy-to-configure monitoring tool according to each business. Pandora FMS integrates with the needs of the business, being able to monitor servers, network equipment, terminals and whatever is necessary. In this article we will focus on monitoring using Pandora FMS, bearing in mind the new reality, which has arrived to stay, known as “Digital Transformation”.

The essentials of Windows event logging

One of the most prevalent log sources in many enterprises is Windows Event Logs. Being able to collect and process these logs has a huge impact on the effectiveness of any cybersecurity team. In this multi-part blog series, we will be looking at all things related to Windows Event Logs. We will begin our journey with audit policies and generating event logs, then move through collecting and analysing logs, and finally to building use cases such as detection rules, reports, and more.

Streamlining Vulnerability Management with Splunk Phantom

Vulnerabilities are weaknesses in the security infrastructure that bad actors can exploit to gain unauthorized access to a private network. It is nearly impossible for security analysts to patch 100% of the vulnerabilities identified on any given day, but a vulnerability management plan can ensure that the highest risk vulnerabilities (those that are most likely to cause a data breach), will be addressed immediately.

Monitoring AWS EC2 with Splunk Observability

Today, much of our online world is powered by cloud computing, and Amazon Web Services offers an amazing depth and breadth of available services. However, most of the time it starts with Amazon Elastic Compute Cloud, EC2. EC2 is powered by virtual servers called instances and allows users to provision scalable compute capacity as desired. This means no server hardware investment and the ability to scale up or down in response to demand (thus elastic).

How to Plan a Threat Hunt: Using Log Analytics to Manage Data in Depth

Security analysts have long been challenged to keep up with growing volumes of increasingly sophisticated cyberattacks, but their struggles have recently grown more acute. Only 46% of security operations leaders are satisfied with their team’s ability to detect threats, and 82% of decision-makers report that their responses to threats are mostly or completely reactive — a shortcoming they’d like to overcome.

4 Steps for Investing in Telecoms Solutions & Employee Experience

After more than a year of remote work and video meetings, most people are ready to bid farewell to the days of collaborating with colleagues through their computer screens. Not so fast. The approaching end to the pandemic doesn’t mean an end to telecommunication as the primary form of workforce collaboration. According to a recent study: While some companies have embraced remote work as the new normal, most businesses are preparing for a hybrid workplace.