Operations | Monitoring | ITSM | DevOps | Cloud

Log4j Log4Shell Vulnerability Q&A

In our recent webinar, Log4j Log4Shell Vulnerability Explained: All You Need To Know, our Senior Director Security Research expert Shachar Menashe shared information on the security issue and how to detect and remediate it. We are happy to share additional information in the following Q&A, based on the questions raised during the webinar.

Monitoring AWS EC2 Cloud Instances with AWS CloudWatch

Amazon Elastic Compute Cloud (Amazon EC2) is a web service that provides secure, resizable compute capacity in the cloud. It is designed to make web-scale cloud computing easier for developers. Amazon EC2’s simple web service interface allows you to obtain and configure capacity with minimal friction. It provides you with complete control of your computing resources and lets you run on Amazon’s proven computing environment.

Auvik's Network Vendor Diversity 2021: Who Reigns the Network?

At the end of November 2021, Auvik released our annual Network Vendor Diversity Report, and the data we collected had some interesting findings. Over 520,000 devices across 40,000 networks contributed, showing which vendors are taking a leading share of the market. In this roundup, we’ll show you some of the most interesting learnings we saw in 2021.

Database monitoring with Sumo Logic and OpenTelemetry-powered distributed tracing

We are living in a data world. Data describes and controls almost every aspect of our life, from the president's elections to everyday grocery shopping. Data grows exponentially and so does the complexity of applications that manage that data. We all know the recent shift to microservices and other revolutionary changes that happened in the way we design, develop, deploy and operate modern applications.

A Comprehensive Guide to Firewall Monitoring

Securing your company's network against online threats can seem like a daunting task. There are so many different e-commerce security threats, and it can be hard to know where to start or if you're adequately protected against all of them. One important weapon in the fight for network security is your firewall. Although your firewall will remain hidden from view for most of your employees most of the time, you shouldn't forget about it.

PHP 8.1 lays new ground on Upsun

Every year, the PHP foundation releases a new version of PHP that includes updated features for users. These new releases offer a sweet way to kick off every holiday season for developers and application makers (like me). Just days after its official release, we made PHP 8.1 available for all projects on our Grid plans. Now, you can take advantage of the long-awaited PHP 8.1 features on Upsun.

Get the most out of kiosk devices while securing them using MDM

There’s a good chance we all interact with kiosks just as much as we do with humans, and this was true even before the pandemic. Self-service counters, airline check-in systems, library search devices, huge digital billboards for advertising, compact mobile devices for remote workers, ATMs at every corner, you name it.

Sponsored Post

Discovering vulnerable Log4J libraries on your network with EventSentry

Just when the Microsoft Exchange exploit CVE-2021-26855 thought it would win the “Exploit of the year” award, it got unseated by the – still evolving – Log4J exploit just weeks before the end of the year! Had somebody asked Sysadmins in November what Log4J was then I suspect that the majority would have had no idea. It seems that the biggest challenge the Log4J exploit poses for Sysadmins is simply the fact that nobody knows all the places where Log4J is being used.

Sponsored Post

5 Process Improvement Methodologies To Change Your Business

Process improvement is an organizational strategy for achieving superior performance by systematically identifying flaws or inefficiencies in business processes, analyzing the data collected and determining how to address these issues. The methodology involves a series of steps. In this article, you will find 5 of the best process improvement methodologies.