Operations | Monitoring | ITSM | DevOps | Cloud

Blog

Top 3 Citrix Mistakes, Fixes and Tips - How to Become a Citrix Hero

Citrix deployments – needless to say but let me say it nevertheless – are complicated. There are too many moving parts, various dependencies, and myriad configurations and customizations. Ultimately, organizations expect seamless connectivity and access to virtualized applications and desktops for their employees and partners whenever and wherever.

Disable Unused IAM Access Keys Action

According to Best Practices for Managing AWS Access Keys, if you must utilize IAM access keys, it is best to remove or disable unused keys. This will close possible security holes in your AWS account. Today, we’re happy to announce a new action to help with this task: Disable Unused IAM Access Keys. This new action will iterate through the IAM users in your AWS account, determine when any access keys were last used, and if they were not used inside a configurable threshold, disable the keys.

How to Troubleshoot the 33+ Stages of the Citrix Logon Process

Troubleshooting Citrix XenApp and XenDesktop logon duration is challenging because it’s a complex process, it’s asynchronous, meaning multiple things are happening simultaneously, and it’s also variable. Some logons will have 33 sub-steps in the process, and others will have more than 50. Any technology that doesn’t offer visibility into all the sub stages can only show that there is a general problem and not the true root cause of the issue.

Advanced Mitigation Techniques to Stop DDoS Attacks in Their Tracks

In our last blog post, we learned what the Distributed Denial of Service (DDoS) attack is, and examined the DDoS picture globally. As we walked through some recent and well-known cases, we also surveyed a range of attack types and drilled down to specific examples. In this article, we’ll study the mitigation techniques you’ll need to resist these attacks. You’ll learn: 1. How to avoid becoming a bot; 2. How to prepare your own network for the possibility of an attack and finally; 3.

Let's talk about Data Center Monitoring

The term Data Center Monitoring is used in the communications plan of some companies as if it were a product specially designed for this area. However, when it comes to these ideas we believe that they actually refer to a summary of monitoring tools facilities that are intended to support the work of Data Centre managers.

Machine Learning in IT & Digital Operations: Why Now, And What to Keep in Mind

You’ve just recovered from a critical application outage and your team is being asked to report on root cause and recommended remediation steps later this afternoon. Can you quickly analyze all the data, identify all the leading events, and discern which one was responsible for the cascading failure?

Announcing Advanced On-Premise and Multi-Cloud Logging Platforms

We’re excited to announce the general availability of our new On-Prem, Self-Hosted, and Multi-Cloud logging platforms. Our customers will have the capability to log data in their infrastructure of choice. Whether across multiple public/private clouds or within a customer’s own data center, logs can be viewed through a unified interface while addressing any data locality and performance requirements.

Near Real-Time Log Collection From Amazon S3 Storage

We are very excited to announce a new capability for our Amazon S3 sources. Until recently, the only method Sumo Logic used for discovering new data in an S3 bucket was periodic polling. However, with our new notification-based approach, users can now configure S3 sources such that Sumo Logic is notified immediately (via AWS SNS) whenever a new item is added to an S3 bucket, eliminating the need to wait for new objects to be discovered via periodic polling.

MSP Hyperspecialization: Building Your Niche Offering

In part two of our two-part series on MSP hyperspecialization, we share tips and examples of how MSPs can create their own extremely competitive niche. (Read part one on why hyperspecialization is such a high-margin opportunity.) So you get the business benefits of hyperspecializing your MSP to serve a particular business niche, and you understand the five criteria of niche expertise you need to do so. Awesome! You’re ready to jump aboard a high-margin opportunity. But… now what?