Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Designing On-Prem Kubernetes Networks for High Availability

Designing and maintaining networks is hard. When deploying Kubernetes in your on-prem data center, you will need to answer a basic question: Should it be an overlay network on top of an existing network, or should it be part of an existing network? The Networking options table provides guidelines to choose the right type of networking based on various factors.

Keeping Remote Workers Connected With Proactive VPN Monitoring

For companies who can’t—or just don’t—host all of their information and applications in the public cloud, VPNs are a gateway to business-critical resources that employees need to do their jobs when they’re not in the office. Since we’re in the middle of a global pandemic, most of us can’t go into our offices. But bills still need to be paid, customers still need to be contacted, and internal resources like line of business applications need to be accessed.

Is the role of ITSM only limited to IT? Understanding Enterprise Service Management

Enterprises are facing new challenges not just in terms of staying relevant in the market and customers but also in controlling internal organizational chaos. Over the years, there have been a number of frameworks and models that were consistently being rolled out to assist enterprises to declutter operational and organizational challenges, streamline enterprise services and service delivery, and identify loopholes and fix them.

Handling the emerging security challenges and possible concept change

With current global crisis spreading into multiple areas of information technologies, it is crucial to learn how are the security-related areas affected, and what it would mean for the entire IT industry. Remote access to network resources results in both increased load on new and existing tools allowing performing most activity remotely (to grasp the possible scale of impact: read, for example, about recent Zoom service controversies).

Understanding and Baselining Network Behaviour using Machine Learning - Part I

Managing a network more effectively has been something our customers have been asking us about for many years, but it has become an increasingly important topic as working from home becomes the new normal across the globe. In this blog series, I thought I’d present a few analytical techniques that we have seen our customers deploy on their network data to: Better understand their network and Develop baselines for network behaviour and detect anomalies.

Understanding and Baselining Network Behaviour using Machine Learning - Part II

A difficult question we come across with many customers is ‘what does normal look like for my network?’. There are many reasons why monitoring for changes in network behaviour is important, with some great examples in this article - such as flagging potential security risks or predicting potential outages.

Impact of COVID 19 on IT Infrastructure & Shift in Priorities

So many aspects of our business & lives are under pressure right now due to the global pandemic. In the middle of all this, IT infrastructure still remains the backbone of the smooth business operations. Motadata is committed to helping individuals like you & your organization to get through these tough times. We are in this together. We can do this together. People in IT are always busy. Now your firefighters are working from home, you would not want to bother them for redundant tasks.

What is Anomaly Detection? It's Role In Network Monitoring

There are some really crucial metrics that are valuable in terms of the insights they offer. Such metrics include user logins, application throughput, network usage and more. Ironically however, some of these metrics are also the ones that are the most variable, having definite valleys and peaks depending on specific times of a week and because of this, it becomes invariably difficult to set up thresholds for analysis and investigation.

5 key network aspects to focus on for HIPAA compliance

The Health Insurance Portability and Accountability Act, also known as HIPAA, is a compliance standard that was implemented after all health-related information was digitized. The crux of the act is to ensure that all sensitive electronic protected health information (ePHI) has restricted, secure access. Various aspects of your network determine your compliance with HIPAA standards. Let’s discuss some of these important components in detail.

IT Service Management Trends to Watch Out for in 2020

ITSM is a hot topic for people who manage IT infrastructure. There are new developments coming out every few months that tend to show where the industry is headed. ‘Automation’ has been all the craze for the past few years, yet it is still quite relevant even today. Then there is ‘digital transformation’, another significant industry jargon that gets thrown around a lot. Last year was all about the release of ‘ITIL V4’ – a major step towards the future.