Operations | Monitoring | ITSM | DevOps | Cloud

%term

Container security orchestration with Falco and Splunk Phantom

Container security orchestration allows to define within your security policy how you are going to respond to your different container security incidents. These responses can be automated in what is called security playbooks. This way, you can define and orchestrate multiple workflows involving different software both for sourcing and responding. This is how Falco and Splunk Phantom can be integrated together to do this.

Advanced analytics for ServiceDesk Plus' ticket history, projects, and knowledge base modules

We’re happy to announce the release of advanced analytics for three more ServiceDesk Plus modules: Request transition history, Projects and Knowledge base management. Read on to see how this integration between ServiceDesk Plus and Analytics Plus gives enterprises better visibility into their help desk activity.

The New and Improved Uptime.com Transaction Check Tool

The Uptime.com Transaction Check tool is evolving. It’s designed to mimic user interactions, and can interact with nearly every element on your website. The Transaction Check is an important monitor for those worried about conversions or signup forms. It can measure landing pages, shopping carts, and other interactive elements, mimicking the customer experience and providing important metrics about response time and errors along the way.

Sponsored Post

C# Logging best practices in 2019 with examples and tools

Applications that have been deployed to production must be monitored. One of the best ways to monitor application behavior is by emitting, saving, and indexing log data. Logs can be sent to a variety of applications for indexing, where they can then be searched when problems arise.

Service based access control with Sysdig Secure Teams

While you’re likely familiar with role-based access control, Sysdig teams introduce the concept of service-based access control. With service-based access control, administrators can define groups of users that have access to policy events, policy configuration, and scanning data limited to a service or set of services, as defined by your orchestration system (think Kubernetes, Mesos, and the like).