Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Your Performance Data, Your Way With Custom Charts in SentryOne Portal

Our product and engineering teams have spent a significant amount of time over the past year working on a new dashboard experience in SentryOne® Portal to give you the upper hand in monitoring your servers and diagnosing performance issues. Providing control over the way data is displayed is one of our most requested features, and we’re excited to satisfy this request with custom charts.

Don't Sweat the Small Stuff but Consider This with Sweating IT Assets

Sweating IT assets, ever heard of them? It might seem nonsensical to imagine an IT asset perspiring from being overworked, but it’s actually not a far-off analogy. When a business delays the purchasing of new technology as long as possible, it’s called ‘sweating assets.” Companies have their reasons for this strategy, but it usually comes down to one thing: an attempt at cost-savings. Do sweating assets actually help to achieve this and where do they miss the mark?

New Pandora FMS features and improvements

Today we are here to make a small compilation of the new Pandora FMS features launched throughout this last year 2020, a general review of all the small advances that we incorporated and that will be useful when you are at the controls of our software. Mainly we are going to deal with new features but also great improvements in quality of use that we added to Pandora FMS throughout 2020.

Security operations center, Part 3: Finding your weakest link

Any organization with data assets is a possible target for an attacker. Hackers use various forms of advanced cyberattack techniques to obtain valuable company data; in fact, a study by the University of Maryland showed that a cyberattack takes place every 39 seconds, or 2,244 times a day on average. This number has increased exponentially since the COVID-19 pandemic forced most employees to work remotely, and drastically increased the attack surface of organizations around the world.

5 reasons integrated patch and vulnerability management mitigates risks swiftly and efficiently

ESG research on cyber risk management, which involved 340 cybersecurity professionals, revealed that 40 percent felt tracking patch and vulnerability management over time was their biggest challenge.

Analyzing Elastic Workplace Search usage in a Kibana dashboard - part 2

For the 7.10 release of Elastic Workplace Search, we highlighted some of the new analytics logging capabilities and took you through a short walkthrough of some sample analysis scenarios. With the 7.11 release we introduced analytics fields, which open up new possibilities for exploring query and click data with helpful dashboards and visualizations.

IT Ops tax: Death by a thousand cuts

There are many hidden costs in running sub-optimal IT operations, that most organizations don’t consider. Enterprises often look at service downtime as their only KPI, but that is really only the tip of the iceberg. Without a properly operating incident management lifecycle, enterprises tend to support poorly performing services instead of fixing them.