Operations | Monitoring | ITSM | DevOps | Cloud

Tis The Season: Protect Your Availability During The Holidays

Deck the halls! It's time for the annual holiday Code Freeze, that festive time of year when businesses impose a precautionary halt to code changes and Operations should be quiet. But before you kick up your feet, make sure that demand doesn’t lead to availability embarrassments. After all, retail experts suggest that we’re in for another online-heavy holiday shopping season, so businesses need to brace for increased digital traffic...with little tolerance for failure.

5 Criteria You Need to Drive Efficient Alarm Management

As a commercial pilot landing at night on an unfamiliar runway, the last thing you want is a cockpit alarm telling you the passenger in 14A wants more ice in their soda. You need to concentrate on the job at hand. At that critical moment in flight, you only want visibility into the alarms that matter. It’s the same with your monitoring environment. Too often, you can be overwhelmed by a tsunami of alarms—thousands of monitoring alerts that all point to the same problem.

Get Started with Connected Experiences

November, the season of post-conf, is upon us. Hopefully all you Splunk admins and sc_admins are craving the release of a ton of new.conf21 Splunk features. Well, good news, because Connected Experiences is here to help you get started with everything Splunk Mobile, Augmented Reality, TV and iPad with this one handy guide. Let’s get started!

Splunk Developer Fall 2021 Update

While it’s cooling down here in California as Fall arrives, we have some really hot and exciting updates from.conf21, including the announcement of Splunk Cloud Developer Edition, the new Splunkbase user experience, detailed guidelines to help you deliver cloud-ready apps for Splunk Cloud Platform, AppInspect updates with new checks, a helpful blog about storing app secrets, updated docs for Modular Inputs and External Lookups, a summary of SDK updates, and more.

A comprehensive lifecycle approach to ransomware defense

Ransomware continues to be a costly and growing problem. According to Infosecurity Magazine, the number of ransomware attacks grew 288% between the first and second quarters of 2021. Cybersecurity Ventures estimated a ransomware attack occurs every 11 seconds, Cybercrime Magazine reports. The resulting price tag from ransomware is truly staggering.

23 Minutes Lost: The Real Consequences of Digital Workplace Distractions

We’ve all been there: you’re dialed-in to a specific task, hyper-focused on completing it… and then some minor distraction pulls you away. An email notification chimes, a coworker asks you a simple question, an angry driver wails on his horn outside your window – and when you return to the task at hand, you realize that tunnel-vision focus you just had is now lost.

Monitoring Your Smart Home with InfluxDB and IFTTT

Do you have a bunch of smart home devices, such as IoT devices like smart switches, cameras, doorbells, alarm systems or appliances? Have you ever wanted to monitor and send events from those devices to InfluxDB? And wouldn’t it be amazing if you could do that with zero coding? With IFTTT Webhooks, you can! Let’s dive in.

Why you should have a website monitoring tool ready for Black Friday

It’s that time of year again – no, not Christmas, but the hugely anticipated Black Friday. When discounts hit bigger numbers than the lottery, and customers get into a bargain-hunting frenzy. But it’s not all fun and games as a company owner during the biggest sales season of the year; unfortunately, you’re more likely to suffer website issues than on an average day.

Understanding business and security risk

Even if an organization has developed a governance team, aligning integration decisions with business needs must be incorporated into the zero trust architecture. The company’s business model drives the applications chosen. The senior leadership team needs someone who can translate technology risks and apply them to business risks. For example, security might be an organization’s differentiator.

Controlled Unclassified Information: Top 4 Management Tips

In 2010, the United States government mandated an order to safeguard sensitive information it created or owned. Unlike classified information which can be accessed by only a few key people, unclassified information can be accessed by many governmental and non-governmental bodies. Therefore, this information can't be termed as classified, but it still requires controlled access and dissemination due to its sensitive nature. Hence the name, Controlled Unclassified Information (CUI).