Operations | Monitoring | ITSM | DevOps | Cloud

%term

Reduce application exploitation opportunities with cloud endpoint security protection

It’s no surprise to say that today’s digital business environment is incredibly dynamic. And the proliferation of distributed devices and applications has been a key part of that. The problem this has created? An increased exploitation of endpoint applications, jeopardizing data security and disrupting operations. Yet companies have limited security resources for coping with these risks. But businesses can mitigate them by moving to the cloud.

Ask the Expert: Insights from Paula Thrasher, Senior Director of Infrastructure and Platform, PagerDuty

In this blog post, Paul Thrasher, Senior Director of Infrastructure and Platform at PagerDuty, provides her takes on the challenges and opportunities facing tech leaders today. From managing complexity to driving operational resilience, Thrasher shares expert insights on how executives can get ahead of disruptions.

Grafana Beyla: what's new and what's next for the open source eBPF auto-instrumentation tool

It’s been a year since Grafana Labs announced the general availability of Grafana Beyla, our open source OpenTelemetry and Prometheus eBPF auto-instrumentation tool to help you easily get started with application observability. As a Beyla maintainer, I wanted to take a minute to reflect on what we’ve accomplished with Grafana Beyla since then, what we have learned about supporting an eBPF tool in production, and, in general, how exciting this whole journey has been.

Drain the Data Swamp! Tagging your Data in a Data Lake to help Organize and Optimize Search

Sending events into a data lake can make it challenging to find and organize them. Using tagging with Cribl Lake in conjunction with Cribl Search across a primary data source will increase speed of analysis and reduce costs, as well as help keep your data organized. This scenario involves us performing an investigation for an incident that occurred where our systems indicated unusual activity from an IP address of aaa.bbb.ccc.ddd.

Application Experience - Amplifying Observability for Today's Experiential World

Nexthink’s industry-leading Experience 24 Events in Boston and London brought together over 1000 IT professionals dedicated to accelerating the value of strategic adoption of DEX. A hot topic was the growing recognition that traditional Observability solutions (APM’s and other high-cardinality technology monitoring solutions) while necessary, are insufficient to solve the full, end-to-end visibility of how employees are experiencing the totality of their web applications.

What is Uptime?

What is uptime anyway? Behind any successful online operation is a resilient infrastructure and a team with a well-honed operational discipline dedicated to ensuring uptime metrics consistently meet the benchmarks required to fulfill service commitments. However, brief downtime can have serious repercussions when infrastructure falters or servers are pushed past their limits.

If it can happen to Mark Cuban, it can happen to you and your organization

In today's digital age, we rely on our phones and laptops as our central hub for communication. This is true in both our business and personal lives. However, recent events have shown that no one is immune to cyber-attacks. In this blog post, we highlight a recent incident involving billionaire Mark Cuban (Dallas Mavericks, Shark Tank) and how his email account was hacked via his phone. It serves as stark reminder that no one (or business) is immune.

Enhance observability with AI-powered IT operations

Your organization probably relies on a collection of observability tools to track specific elements of its IT stack. You’re not alone; a recent survey from Enterprise Strategy Group showed that most organizations have six or more observability solutions. Our research found that the average BigPanda customer uses 20 observability and monitoring data sources!

Getting Started with Icinga: Your All-in-One Guide to Mastering Monitoring

Whether you’re new to Icinga or a seasoned user who thinks they’ve seen it all, some of these resources could surprise you with a few tricks. Let’s dive into the resources that’ll have you saying, “Why didn’t I think of this sooner?” Or send this to someone you would like to rope into the Icinga universe.

How to Integrate Apple Business Manager with NinjaOne MDM

Join NinjaOne Field CTO Jeff Hunter for a walkthrough on how to integrate Apple Business Manager with NinjaOne MDM. This process creates a smooth workflow from the purchase of the device, into ABM, and then into NinjaOne MDM, where device settings, network configurations, and applications can be managed.