Operations | Monitoring | ITSM | DevOps | Cloud

Blog

Detecting Data Breaches by Example - Vision Direct

Just as we were getting ready to launch our Data Breach Monitor, we heard the unfortunate news that fellow Yorkshire based business Vision Direct had suffered a malware attack, which resulted in the loss of financial data of around 6,600 customers. So we asked ourselves, could we have detected the same attack using our new monitor? The only way to find out was to infect a website and see what would happen…

Incident Communications - Get Ready for Black Friday/Cyber Monday 2019!

As the year draws to a close, for many of us this is a time to slow down, kick back and look forward to holiday time. For others, the work certainly isn’t done yet. The “S” word comes down to bear. Like it or not, this time of year – it’s all about the Shopping.

Business Chat Apps in 2018: Top Players and Adoption Plans

Even though email is ubiquitous in the workplace, and is undoubtedly a useful communication tool, using it can also pose some challenges. Email is prone to spam, it can be unnecessarily slow, and it’s easy for email recipients to be dropped from threads or excluded from conversations entirely — which can lead to missed connections and frustration.

Introducing Sysdig Secure 2.2: Kubernetes auditing, compliance, and access control.

Over the past four years we’ve helped hundreds of organizations run reliable, secure, and compliant Kubernetes and Openshift clusters. Some of the key themes we’ve seen from organizations that have successfully grown their Kubernetes footprint are: they have immaculate labeling, understand how to leverage internal Kubernetes features to harden their platform, and understand what developers need access to and manage it with RBAC and namespaces.

Scaling DevOps for the Enterprise

A decade ago, an enterprise adopting DevOps was a rare event. In the last decade, some businesses dipped their toes in, others spent big money going all in. Now the question isn’t whether to make the culture shift, but how to be successful as it grows. It’s how to scale the adopted DevOps practices in the enterprise. This article is going to focus on highlighting common missteps and offer advice that can help you make decisions to handle the challenges ahead.

NiCE VMware MP 5.00 Preview Release

Be the first to get a complete picture of the health and performance of your business critical VMware environment using the new NiCE VMware Management Pack. The NiCE VMware Management Pack delivers first-rate monitoring for business critical, highly dynamical virtualized environments. Leverage your existing investment and reduce costs, save time and build efficiencies now.

Part I: Anomaly Detection in monitoring: what can we really do?

In recent years we have frequently found the term anomaly detection in monitoring. In fact, some monitoring tools have introduced in their features the customized application of anomaly detection algorithms and some companies offer anomaly detection from data collected by monitoring tools.

Key metrics for monitoring Tomcat

Apache Tomcat is a server for Java-based web applications, developed by the Apache Software Foundation. The Tomcat project’s source was originally created by Sun Microsystems and donated to the foundation in 1999. Tomcat is one of the more popular server implementations for Java web applications and runs in a Java Virtual Machine (JVM).