Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Manually Add a Metadata Source in SentryOne Document

SentryOne Document supports multiple metadata sources, and we plan to expand available providers in the future. But what if you want to add a metadata source that isn’t currently supported? This is where SentryOne Document’s Custom Metadata Import, available in both the Software and Cloud edition, can help. Leveraging this provider, you can manually insert any metadata source—DB2, REST API, or others.

My Build, My Way | JFrog Pipelines Extensions

Once my new projects are almost ready to share with the team and I can build and test them locally, I’ll need a CI automation tool to test and deploy each release. As a Principal Consultant Declarative Systems, I’ve been recommending JFrog Artifactory to clients looking to bullet-proof their deployments since 2016. After considering different CI solutions, we found that JFrog Pipelines has the best integration with Artifactory which made choosing this platform a no-brainer.

Five Key Identity Governance Features That Your Identity and Access Management Solution Does NOT Support

Since the start of the COVID-19 pandemic, identity management has taken center stage as the key enterprise security practice for enabling remote workforces while protecting company data and IT services.

Revoke certificate of an Icinga endpoint

A Certificate Revocation List (CRL) is a list of certificates that have been revoked by the issuing Certificate Authority (CA) before their scheduled expiration date. Those certificates should no longer be trusted. A client application such as an Icinga Agent can use a CRL to verify that the certificate of the server is valid and trusted.

Customer Experience: The Good, the Bad, and the Ugly

This article was previously published by Raconteur. Unmanageable workloads often have a knock-on effect on the customer experience (CX), and businesses can no longer afford to get this wrong. The expectation of an always-on experience and increasingly saturated markets can mean a poor experience will send customers elsewhere. And yet, many businesses are struggling to deliver the great customer experience that is demanded.

Search and replicate across regions and cloud service providers with Elastic Cloud

We are excited to announce the general availability of cross-cluster search and replication on Elastic Cloud. These two features allow you to search and replicate data across clusters in different regions and cloud service providers globally, making it possible to: Be sure to dive in and learn more about the features below! Cross-cluster search lets you search remote clusters across multiple regions and cloud service providers. When you break down regional data silos, you can get insights faster.

Deploying Elastic to further strengthen IT security at TierPoint

TierPoint is a leading provider of secure, connected data center and cloud solutions at the edge of the Internet with thousands of customers. At TierPoint, I’m responsible for maintenance and development of the information security program, which includes threat analytics, incident response, and digital forensics. We’re constantly looking for new and even more effective ways to aggregate, process, and make decisions from massive amounts of data streaming in from diverse sources.

Hyperautomation in IT Operations

It made it into our IT Operations Glossary for 2021 blog last month but got rejected by Wikipedia. Gartner included it in its Top 10 Strategic Technology Trends for 2020 list and business process management software vendor Appian published a book about it. We’re talking about hyperautomation. Wikipedia’s reservations aside, hyperautomation is a technology trend that’s moving beyond the business process management (BPM) world and into IT operations.

How to Marie Kondo Your Incident Response with Case Management & Foundational Security Procedures

Marie Kondo, a Japanese organizational consultant, helps people declutter their homes in order to live happier, better lives. She once said: Similarly, in security, operational teams are constantly bogged down by a “visible mess” that inhibits their ability to effectively secure their organization.