Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

DNS Blacklist Monitoring: Protect Your Company's Reputation

Did you know that around 306 billion emails have been sent globally every day in 2020 and about 45 percent of all emails received are spam. Even more surprisingly, websites that are marked as spam on email portals lose 95 percent of their traffic. Email servers tend to blacklist certain IDs as spam based on their content. And for companies marketing their business via emails, 36 percent of the total spam messages across the globe are attributed to advertising content.

The Importance of Monitoring SSL Certificates

Secure Sockets Layer, or SSL, is a global security standard technology that is being adopted by a number of different organizations across the globe. Essentially, SSLs are small data files containing a cryptographic key. This key carries important information about the organization using it. Around 600,000 websites have installed SSL certificates for security.

VPN vs. Remote Desktop - Gateway Security Concerns

VPNs and Remote Desktop Gateways are two different tools used to achieve similar goals. That is: access content or software remotely and securely, and improve the overall freedom of the user – whether that’s from prying eyes or the need to have physical access to their business network. But while each option can be attractive, neither is without its security concerns.

3 ways secrets management improves monitoring & observability

Monitoring — by its very nature — requires privileged access to internal and external services. In order to safely maintain visibility into critical systems, it’s vital to have some form of secrets management to manage authentication credentials (AKA, "secrets"), including passwords, keys, APIs, tokens, and any other sensitive pieces of information in your IT infrastructure.

Cut down the time to improve with ITSM Continual Improvement Management

We measure a lot of our ITSM success through increments of time. But mean time to resolution, time on page in the knowledgebase, and cases-per-hour aren’t just go-to metrics. They set the cultural expectations for our service teams – that improving service times, without sacrificing quality, is paramount.

Your ITSM should have purpose-built workspaces

Look around your desk, and you probably see a variety of tools that make you more productive — an ergonomic chair, a mug of coffee or tea, a notepad, or a charger. As individuals, we put great thought into making our personal space productive, a habit that many organizations have yet to fully replicate in their digital workspaces.

5 things you should look for in your ITSM chatbot

Chatbots are rising in popularity, both in consumer and enterprises circles, because they are quick, sometimes clever, and ultimately help workers and customers get answers to common questions without bogging down your service team. As part of our ITSM Professional package, ServiceNow’s Virtual Agent far exceeds some of the chatbots you may have used in your personal life for one simple reason – access to information.

Building a Metrics & Alerts as a Service (MaaS) Monitoring Solution Using the InfluxDB Stack

The larger an enterprise becomes, the more systems and applications there are to monitor, and the more scalable its monitoring system has to be to keep up with business growth. This is the challenge that RingCentral — which provides cloud-based communications and collaboration solutions for businesses — faced and solved.

Minimize business losses by monitoring your applications' performance

Downtime is the biggest nightmare for organizations that capitalize on technology. A study about enterprise outages found that nearly 96 percent of enterprises had faced downtime in the past three years. Businesses lose a minimum of $1.55 million annually and 545 hours of staff time due to IT downtime. Up to 51 percent of downtime is preventable, which means businesses are spending on damage control when these resources could be diverted to something more fruitful, like R&D.