Operations | Monitoring | ITSM | DevOps | Cloud

Dashboard Studio Tips: What's New in 8.2.2106

Here on the Splunk Dashboards team we take your feedback seriously. While we can't get to every request right away, we do add most requests to the backlog so we can roll your feedback into the product. In this blog post, we'll cover new features and improvements to Dashboard Studio in Splunk Cloud Platform 8.2.2106 based on feedback from you, our customers.

The 8 questions people always ask about uptime monitoring

Website uptime monitoring is exactly what it sounds like; a service that monitors your website from the countries you’ve selected, to see if it is up and running. This saves you the stress of having to constantly use your resource to check for any downtime, or individual errors/issues, or run the risk of your customers telling you it’s down. The best part about uptime monitoring is that you can choose how often you’d like your site to be monitored.

ESM: How we break down silos, boost productivity, and reduce costs

Nick Borgwardt, director of ITx workflows at ServiceNow, co-wrote this blog. How do I reset my password? How do I add someone to a distribution list? How do I request ergonomic home office equipment? At many companies, when employees have questions like these or need help, they face the complexity of threading together siloed processes. Sometimes a task can require getting in touch with multiple departments, creating friction and frustration. Other times, it’s not even clear where to start.

6 Most Common Network Problems

Intermittent network problems frustrate users, affect productivity levels, overwhelm your IT team, and are a pain for network administrators to solve. There are many problems that can affect network performance, and some of them are very complex to identify and understand. To help you proactively identify network problems that may be plaguing your network, we’re running you through some of the most common network problems!

Why Should My Business Consider Private And Direct Connections To Huawei Cloud?

The rapid growth of China's public cloud market and the increased spend on cloud services has seen Huawei Cloud become an increasingly popular option for enterprises. Here we look at some of the advantages of using private connections between Huawei Cloud data centres and your on-premise or colocation environment.

Talk of the Town: Single Page Application

In recent days web application has become a vital part of our day-to-day life. We often don’t understand the technology behind an application as how it works, what type of programming languages have been used or what kind of databases are used to store and retrieve data. But when you try to create one such application you should definitely know how to build an application and the technology stack behind it.

What is Application Performance Management (APM)? Overview and 11 Features to Look for in APM Tool

Application Performance Management is all about gaining a complete picture of your applications' inner workings so you can make sure they're performing as they should. APM tools make it easier for developers to spot issues that are preventing their applications from providing outstanding user experiences. Furthermore, these monitoring services can help to limit the danger of fatal outages and downtime, which can be extremely costly for any company.

Kemp Flowmon ADS and Check Point Integration: Automated incident detection and response

We have recently published a script for the integration of the Anomaly Detection System (ADS) with a Check Point firewall. This ensures automated threat detection and response where attackers are blocked from accessing the network resources and causing even further harm. The previous integration with Fortinet describes a way of stopping the attacker at the perimeter. The following use case is largely the same, except with a Check Point firewall instead.

Democratizing Automation for Security Teams

Everyone wants to automate security. Traditionally, though, doing so has been challenging because setting up security automation tools required a specialized set of skills that no one engineer at a company possesses. It’s time to change this state of affairs by democratizing security automation. Here’s why and how.