Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Feel the Love: Increased Focus on Proven and Treasured Ivanti Solutions

On January 30, Ivanti announced its new product and solution focus areas, programs, and strategies—all in all in an effort to ensure customer success. Read the official press release here. As part of this re-affirmed commitment to customers, Ivanti formed an Independent Business Unit that consists of a dedicated set of Ivanti products and services with the single purpose of pleasing its customers through providing long term value.

STUDY: Nearly Half of IT Professionals Are Still Tracking IT Assets in Spreadsheets

A report just came out from Ivanti which revealed that 43% of IT professionals are still tracking IT assets in spreadsheets. It also illuminated the fact that nearly one third of IT professionals are spending several hours per week supporting out-of-warranty assets. Let's take a closer look at some of the survey's findings, which were also mentioned in this blog.

The OpsRamp Monitor: DevOps Distress, M&As, Coronavirus & Tech

It’s Friday, and a holiday (of sorts) heading into a long weekend (for some). We’re going to start with something light, and then get a little heavier. If you like what you read here, please do share with your colleagues and pals! Share the love...of work. You may not care for the Hallmark holiday of Valentine’s Day, but why not celebrate all sorts of love on this day? Let’s start with work, where great things can happen with the right attitude.

Security monitoring optimization: typical problems and their solutions

Security issues can be a challenge; preventing them via properly set up monitoring can save many resources. However, as network grows, the list of resources subject to monitoring may grow much faster. A typical situation is a data center: when new hosts (servers) are added, multiple monitors of the same type can be added (depending on server type: Web server, mail server and so on). In such a situation, it is required to reduce possible amount of monitors to as small number as possible.

11 Different Types of Spoofing Attacks to Be Aware Of

In terms of cyber-attack vectors, spoofing is exactly what it sounds like. This term embraces a series of techniques aimed at masquerading an attacker or electronic device as someone or something else to gain the victim’s confidence. Whether it is used to deceive a user or to manipulate a computer system, this multi-pronged phenomenon is often at the core of social engineering hoaxes in general and phishing campaigns in particular.

How automation brings your business ambitions to life

Technology is helping enterprises simplify process and supercharge the everyday. A good employee experience (EX) is built on efficient ways of working, freeing employees from repetitive tasks to create a more rewarding workday – one that is spent on interesting, high-value projects. But for business leaders looking to deliver the experiences that employees now demand, where should they start? The short answer: good EX thrives on well-designed automation.

Tool sprawl is slowing down your finance team

Many promising sprinters face a mental roadblock as they develop. Physical training and repetition propel them faster and faster, yet despite pushing their body harder each month, most still plateau. It often takes a wise coach to switch a sprinter’s mindset from simply moving quickly to moving their body with purpose, using better technique, and taking longer strides. Finance teams face a similar predicament with their monthly financial close process.

How ServiceNow leaders see the future of work

2019 was an exciting year for ServiceNow—not just in terms of business results, but in how we led a series of important conversations about the future of technology and work. On our Workflow site, thought leaders across the company weighed in on a range of timely issues, from a new manifesto for IT to a new sense of purpose for employees. Here’s some of the best thinking on Workflow from 2019.

How to monitor Kubernetes audit logs

Datadog operates large-scale Kubernetes clusters in production across multiple clouds. Along the way, audit logs have been extremely helpful for tracking user interactions with the API server, debugging issues, and getting clarity into our workloads. In this post, we’ll show you how to leverage the power of Kubernetes audit logs to get deep insight into your clusters.