Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

COVID-19 Guide for Security Professionals

What a world! In February, everyone was busy minding their own business, but since March, the entire globe suddenly focused on the same challenge. The COVID-19 pandemic has taken our businesses and private lives by storm. The outbreak surprised everyone - a surprise hardly any business was prepared for. It brought country-wide lockdowns for quarantine, office closures and enforced teleworking, which are now commonplace.

Top 5 security challenges with Zoom video conferencing

In times when a majority of employees are working from home due to the global coronavirus pandemic, enterprises are extensively relying on collaboration tools like Zoom to keep their employees productive and engaged. Only in March, the daily usage of Zoom Videos increased over 5 times. The platform made it easy for company employees and clients to hop on meetings whenever needed and for schools and students to continue education online.

7 Remote Work Problems IT is Solving With Nexthink

The past several weeks have been anything but normal, especially for those in enterprise IT. Though every company is facing their own unique challenges, we have noticed that certain technical use cases come up over and over again with our customers. After two months, and hundreds of use cases, we’ve picked the top remote work problems that enterprise IT departments are solving with Nexthink.

Your Last Local IP Address, Giving Context to IT's Remote Worker Data

With millions of employees recently making the jump to remote work, some IT departments are finding themselves on unfamiliar ground, and with newfound stress and pressure. The stakes seem higher now. IT cannot visit an employee’s desk or stop them in the hallway whenever they encounter an issue, they now have to solve problems proactively and remotely. But for some companies, the switch to remote work has been smooth and painless.

An adventure through the Snap Store

An application store with a large number of entries is a double-edged sword. It’s often a good sign of a vibrant, thriving community of software creators, developers and users working together. But then, people new to the ecosystem may struggle finding relevant content right away. The Snap Store currently offers about 7,000 applications, so exploration and discovery can take quite a bit of time and effort.

CIS hardened Ubuntu: cyber attack and malware prevention for mission-critical systems

The Center for Internet Security (CIS) is a nonprofit organisation that uses a community-driven process to release benchmarks to safeguard enterprises against cyber attacks. It is one of the most recognised industry standards that provides comprehensive configuration checklists to identify and remediate security vulnerabilities in a computing environment.

Identity Guard: Identity Theft Protection Tool

Identity theft is on the rise and it is not enough to simply stay on top of the latest trends in this arena to avoid falling victim to common cons; you need to be proactive to prevent sensitive information being stolen and used against you. This is where Identity Guard’s identity theft protection tool comes into play. It aims to deliver always-on protection from the biggest threats faced by innocent web users.

Key Value Parser Delivers Useful Information Fast

Parsers make it easier to dig deep into your data to get every byte of useful information you need to support the business. They tell Graylog how to decode the log messages that come in from a source, which is anything in your infrastructure that generates log messages (e.g., a router, switch, web firewall, security device, Linux server, windows server, an application, telephone system and so on).

Blocking USB Drives For Work From Home Employees

With so many people working from home, the perimeter of corporate data safety has suddenly grown very large, in many cases encompassing employee home computers. Data loss prevention (DLP) was challenging enough already, but now it takes on even more importance. One way that data can escape the corporate network is by getting copied to USB thumb drives. Some companies take the approach of gluing or epoxying the USB ports closed.