Operations | Monitoring | ITSM | DevOps | Cloud

What is Website Monitoring?

Website Monitoring is a broad phrase used to describe the way web teams measure website reliability, performance and security. In today’s increasingly fast-paced world, website monitoring is becoming much more than that. Businesses have been driven online by socio-economic issues like reductions in retail footfall and, most recently, the Covid-19 pandemic. Websites are critical.

Kubernetes security policy design: 10 critical best practices

In this blog post, I will be looking at 10 best practices for Kubernetes security policy design. Application modernization is a strategic initiative that changes the way enterprises are doing business. The journey requires a significant investment in people, processes, and technology in order to achieve the desired business outcomes of accelerating the pace of innovation, optimizing cost, and improving an enterprise’s overall security posture.

Overcoming SQL Server Blocking and Locking Challenges

One of the most common performance problems with SQL Server databases in production is the blocking of queries, which happens because database resources are locked. Understanding why locking happens is just half the battle. Being able to resolve locking, which will resolve blocking issues as well, is the second half.

IT Asset Management 101

If your business is growing, it won't be long until you need to develop an IT asset management protocol that allows you to manage your hardware and software assets throughout their lifecycle, helping to reduce business interruptions, plan budgeting effectively, mitigate risks, and gain high-level insight into how IT is driving success for your organization.

Improving Our Typography to Optimize the Honeycomb User Experience

This is the second post in our series about Lattice, Honeycomb’s new design system and how we’re applying a user-centric design philosophy to our product. Lattice begin! At Honeycomb, we understand that our users are often under a great deal of pressure when troubleshooting complicated issues in their applications.

How does search solve data problems?

Is enterprise data a benefit or a burden? Think about all of the data your organization generates and consumes in the digital age — from security event logs to application error messages, energy consumption to vendor contracts. There is so much, and all of it is usually stored in silos, making the data difficult to synthesize to provide better services, identify signals proactively, or make stronger business decisions.

Coffee Break Webinar Series: "Intelligent Observability - What the Analysts Say"

We know commitment issues are the real deal, especially when it comes to significant and costly tech investments. Understanding how the market is performing and what’s up ahead is critical for investing in AIOps. Our crew is here to help you through the challenging decision-making days and offer up the best analyst guidance.

Managing Updates to the Splunk Cloud Vetting Process

Before apps can be installed in a customer’s Splunk Cloud deployments, these apps have to go through Splunk’s cloud vetting process. Cloud vetting helps ensure that apps are safe and performant for our mutual customers to use in Splunk Cloud. It’s important for us to make regular updates to our cloud vetting requirements in order to ensure apps running on Splunk Cloud are “up to snuff”.

Demystifying the Hype Around XDR

Extended Detection and Response (XDR) has generated a lot of buzz recently with press, analysts, and even customers. There’s no denying that, at face value, its promise of reduced complexity and cost while increasing detection and response is alluring. As security teams look to modernize their security tooling, they’re also looking for solutions to some of their largest challenges. Is XDR the answer? What is XDR, exactly, and how do you determine if it’s right for your organization?

The Top 14 Free and Open Source SIEM Tools For 2021

Security Information and Event Management (SIEM) is a combination of Security Information Management (SIM) and Security Event Management (SEM). A SIEM solution provides real-time analysis of security alerts generated by applications and networks. SIM is the collection, monitoring and analysis of security-related data such as log files into a central repository for trend analysis.