Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Feature Friday #14: variablesmatching() & variablesmatching_as_data()

Did you know you can find variables by name and tag? Like the ability to find currently defined classes (as described in Feature Friday #13: classesmatching()) that match a name or tag, you can find variables by name and tag. It’s a nifty capability. variablesmatching() returns a list of variable names that match the name and tag criteria.1 variablesmatching_as_data() returns a data container of the matching variables along with their values2.

Comprehensive Cloud Security Solutions in the Bay Area

As businesses increasingly migrate their operations to the cloud, ensuring the security of cloud-based assets has become a top priority. In the tech-savvy Bay Area, where innovation meets enterprise, the demand for robust cloud security solutions is paramount. This article explores what cloud security solutions entail, their importance, and how businesses in the Bay Area can benefit from these services.

DDoS monitoring: how to know you're under attack

A while back, we covered how to check your Windows IIS and Loggly logs to view the source of a DDoS attack, but how do you know when your network is under attack? It is not efficient to have humans monitor logs every day and every hour, so you must rely on automated resources. Automated DDoS monitoring gives your security team more bandwidth to focus on other important tasks and still get notifications should anomalies happen due to a DDoS event.

What is MDR and How Can it Benefit MSPs

Staying ahead of emerging threats is paramount for MSPs tasked with safeguarding their customers’ digital assets. However, amidst the broad range of technologies and buzzwords, distinguishing genuine solutions from marketing spin can sometimes be challenging. This blog draws on a recent podcast interview with N‑able Chief Security Officer, Dave MacKinnon, to give insights into Managed Detection and Response (MDR) and its implications for MSPs.

The Role of AI in Modern Call Centers: Enhancing Personal Customer Interactions

In an age where every customer interaction counts, how can you ensure that your call center isn't just meeting expectations but exceeding them? Integrating Artificial Intelligence (AI) into your operations offers a transformative solution. This technology not only streamlines processes but also enriches personal customer interactions, paving the way for a seamless and fulfilling customer experience.

How to Introduce Software Security into Your Organization

In the current business landscape, the security of applications can determine the fate of an entire enterprise. The organization's software development lifecycle (SDLC) and its proficiency in integrating secure coding practices into the software release cycle can differentiate between a flourishing, prosperous company and one caught up in negative publicity and legal challenges. The pressing question is, how can software security be effectively introduced within your organization?

Introducing IP Safelist for our API access

At Rollbar, we understand that security is not just a feature but a cornerstone of modern enterprise operations. As part of our ongoing commitment to providing robust security solutions, we are excited to announce the expansion of our security controls by introducing IP Safelist for our API access. This new feature extends the advanced security options available in our Enterprise packages.

10 Reasons to Get a Proxy for Your Home Use

If you're passionate about maintaining privacy in your digital life, understanding the benefits of using a proxy server for home use is crucial. Proxies offer an extra layer of security and anonymity, which can be particularly appealing for those concerned with protecting their online activity. This article outlines ten compelling reasons why integrating a proxy into your home network is a smart move.