Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

How to replicate user errors without the user with Breadcrumbs and Sessions

If you need to replicate a user error, you’ll know how difficult it can be to pinpoint the cause. Usually, you’d look at the stack trace or ask the user themselves. However, that’s a lot of guesswork, especially if the stack trace is obfuscated. We’ll show you how to replicate the error faster using Crash Reporting’s Breadcrumbs and the Real User Monitoring Sessions feature.

The Importance of Historical Log Data

Centralized log management lets you decide who can access log data without actually having access to the servers. You can also correlate data from different sources, such as the operating system, your applications, and the firewall. Another benefit is that user do not need to log in to hundreds of devices to find out what is happening. You can also use data normalization and enhancement rules to create value for people who might not be familiar with a specific log type.

Metrics At Scale: How to Scale and Manage Millions of Metrics (Part 2)

With businesses collecting millions of metrics, let’s look at how they can efficiently scale and deal with these amounts. As covered in the previous article (A Spike in Sales Is Not Always Good News), analyzing millions of metrics for changes may result in alert storms, notifying users about EVERY change, not just the most significant ones. To bring order to this situation, Anodot groups correlated anomalies together, in a unified alert.

6 Things You Need in an IT Incident Management Platform

Your incident management process is greatly impacted by the tools you have available. And technology is key when it comes to gaining visibility and obtaining contextual data. You need tools to send alerts when incidents arise, as well as track activity for compliance reporting purposes. Whether you’re in healthcare, information technology or work at a small MSP – you need a robust incident management platform that gives you results and helps mitigate MTTR.

6 Reasons to Think of Pager Replacement Options

Antiquated pieces of technology create setbacks in every industry, and in healthcare – it’s the pager! Pagers are still being used even though they’re not HIPAA compliant and the infrastructure supporting them is dying out. That’s why doctors and healthcare personnel alike need an advanced way to communicate and protect patient information. Here are six reasons to think of pager replacement options.

Introducing the All-New, Reimagined ChangeTower - Here's What's Changed

Meet the new ChangeTower. It’s everything that’s important to you across the internet, in one visual stream. Website content monitoring is about more than just knowing when a change occurs. It’s knowing what changes were made made and how they’re important to you. We’re excited to introduce an all-new, reimagined ChangeTower that helps you filter out the ‘noise’ and stay effortlessly in-the-know across websites.

Deadline to Update PCI SSL & TLS Looms, Are You Ready?

Early internet data communications were enabled through the use of a protocol called HyperText Transmission Protocol (HTTP) to transfer data between nodes on the internet. HTTP essentially establishes the “request-response” rules to be used between a “client” (i.e. web browser) and “server”(computer hosting a website) throughout the session.

Using the Content Match feature to detect website defacement

The Content Match feature has the potential to detect and protect against page defacement, as well as fulfilling a few other handy use-cases. Today we’re going to take you through a few of the most common uses of this feature to help you ensure you are getting the most out of it!