Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

The pandemic has indeed caused a massive spike in cybercrime

Recent events of the pandemic have facilitated a rapid implementation of remote working tools, causing an increase in ransomware attacks – businesses suffer from financial and data losses. In order to prevent such attacks, companies must not only educate their employees about best cybersecurity practices but also embed professional security solutions within the internal business processes and systems.

Role-Based Access Control (RBAC) in eG Enterprise

eG Enterprise is a single pane of glass that provides monitoring and oversight of every layer and tier of your IT infrastructure. However, this does not mean every user in the organization has the same view of the IT infrastructure or needs to use the tool in the same way. In fact, controlling a user’s view of the monitored applications and infrastructure, as well as their privileges to perform tasks and access data via Role-Based Access Control, is a critical feature for our customers.

BIG things are Happening at Graylog!

Did you hear the news? Graylog is on a mission to help make your IT environment and data more efficient and secure by making it super easy to uncover the answers stored in your machine data. At Graylog, coming up with solutions to problems faced by IT and Security professionals is what drives us. Our teams are always working on ways to add meaningful functionality that increases productivity so you can focus your resources on the innovation and core competencies that you’re known for.

Cybersecurity Measures Every Project Manager Should Know About

Online projects could be easy prey for cybercriminals due to the involvement of critical security information (emails, different platforms' login passwords, bank accounts, etc.) and multiple people. A simple phishing email requesting new login credentials or bank account details could be effective on negligent team members and could put everybody at risk. In other words, any breach of information by a project team member could lead to a disaster for the parties involved.

Introducing our brand new (and free!) Calico Azure Course

Calico Open Source is an industry standard for container security and networking that offers high-performance cloud-native scalability and supports Kubernetes workloads, non-Kubernetes workloads, and legacy workloads. Created and maintained by Tigera, Calico Open Source offers a wide range of support for your choice of data plane whether it’s Windows, eBPF, Linux, or VPP. We’re excited to announce our new certification course for Azure, Certified Calico Operator: Azure Expert!

Featured Post

The Evolution of Software Trends in 2022

Software delivery has never been more critical to the success of business in every industry. It's also never been more complex. With the growing challenges of complexity, how can engineering teams succeed? After analyzing millions of workflows from more than 50,000 organizations across the world, here are a few truths of software delivery today.

Winning Over the Skeptics: How SD-WAN Is Transforming Government Networks

Are software-defined wide area networks (SD-WANs) worth the hype? Read below as our own Brandon Shopp details the value of this fast up-and-coming technology and how it can help. Public sector wide-area networks (WANs) are undergoing a transformation. The pressing need to support remote workers and a surge in demand for video conferencing, secure remote access, and cloud applications has seen public sector IT teams shift gears away from traditional, often multi-protocol label switching (MPLS)-based WANs.

How to Automate Intune Device Reports with Torq

Whether for managing remote teams, supporting ‘bring your own device’ (BYOD) policies, or simply another layer in a data protection strategy, services like Microsoft Intune offer greater control over the devices on your network. But using the data from these services often requires tedious prep work, and this process is likely repeated multiple times a week, if not daily. Tedious, repetitive, structured: these are all signs that a process can and should be automated.